Research Paper on Real-Life Cybercrimes in the United Arab Emirates

Paper Type:  Research paper
Pages:  7
Wordcount:  1823 Words
Date:  2022-11-29
Categories: 

Introduction

Cybercrime is any criminal act in which a computer of the Internet is used as the main tool. It includes unlawful access to protected websites and can be defined as any unauthorized or unlawful act on computer systems or hacking into data. The top cybercrimes in UAE are hacking, credit card forgery, verbal offense or defamation through the internet, phishing, and fraud through e-mail and fake websites. Police in the region keeps round-the-clock watch on the Internet through e-patrols that track user communications to catch cybercriminals. Thus, this paper seeks to identify, analyze and evaluate real-life cyber crimes reported in the media within the last 3 years.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

28 Men Jailed for Dh635 Million Fraud in Abu Dhabi Bank

The Abu Dhabi Criminal Court of First Instance sentenced 28 men to various jail terms for trying to steal Dh635 million from the account of Al Hilal Bank in Abu Dhabi through bank transfer (Sebugwaawo, 2018). The men were found guilty of fraud and unlawful transfer of the bank's money using means of information technology. Eight of the main defendants were each sentenced to 15 years in jail while 10 others were jailed for 10 years (Sebugwaawo, 2018). Nine other men, who transferred the money to their private bank accounts, were sentenced to seven years in jail each. The remaining five men were cleared of the charges after the court established that they never participated in the fraud. The court ordered the men to return Dh9 million to the bank. Further, they were fined Dh635 million, an amount equal to what they attempted to steal (Sebugwaawo, 2018). In addition, the court ordered them to pay Dh21, 000 as civil compensation to the bank alongside paying the legal charges(Sebugwaawo, 2018).

Analysis

The purpose of this publication is to report a crime and its consequences. In this publication, the author describes fraud through information technology as the form of cybercrime in this case. In particular, the fraud involves the unlawful transfer of the bank's money electronically. Mainly, the news report provides the criminal charges that result from the fraud. In particular, these consequences are imprisonment, fines, civil, and legal charges. In total, the jail sentences totaled 283 years. The criminals were also fined an amount equivalent to the one they attempted to steal in addition to civil compensation of Dh21, 000.

Evaluation

This media report describes the cybercrime comprehensively as the reporter uses evidence to support it. For example, it describes how one of the defendants used another employee's password to access the bank's electronic system. Such a description helps readers and viewers to understand cybercrime, which means that it achieves its goal efficiently. Further, it uses terminology relating to cybercrime such as electronic transfer and fraud, which increases its relevance for inclusion in this paper. In addition, the report enumerates the consequences that arise from the crime and uses quantitative data in support.

Man gets Dh4, 000 Salary Cut, Hacks into Clients' Websites

A 33-year old man was charged at the Dubai Court of First Instance with blackmailing, making criminal threats, hacking, and unlawfully logging into various websites run by the complainant entity (Nammour, 2019). His crimes began after he resigned from working as a programmer for the complainant, and was to be deducted a total of Dh12, 000 that the business would incur as losses for his departure (Nammour, 2019). After resigning, he demanded a refund of Dh4, 000 that had been deducted from his salary and threatened his colleagues through WhatsApp that he would hack into the company's clients' websites (Nammour, 2019). His crimes cost the company several clients and pay up compensations because of the contractual breach and failure to deliver websites as agreed upon on the contracts. Copies of the threats were used as public prosecution evidence. In addition, a letter from the general directorate of criminal evidence and criminology enumerated 15 websites the accused hacked.

Analysis

In this case, the criminal commits three primary cyber crimes namely hacking, online blackmail and electronic harassment. Hacking is the unauthorized intrusion into a computer by altering security features. The defendant unlawfully logged into websites of his former company's clients, which amounts to hacking. Further, he blackmailed his former employer to pay back the money deducted from his salary by threatening to hack into the websites. Finally, electronic harassment was evidenced by the WhatsApp messages the criminal sent to his former colleagues. Notably, cyber crimes result in major consequences to both the victims and the criminals. In this case, the hacking resulted in huge losses to the company in form of compensatory charges demanded by clients for breach of contracts. Conversely, the defendant god jailed for his crimes.

Evaluation

Based on the analysis, the report clearly illustrates the forms of cyber attacks involved in the case. Although it does not define the terms, it uses evidence that increases the readers understanding. Additionally, the report details on the effects of cyber attacks evidenced by the financial costs incurred by victims. Finally, the report indicates clearly that participating in cybercrime is unlawful in UAE and criminals are liable for criminal charges. Hence, this report is informative on cybercrime but the inclusion of the definition of various terms like hacking can help inform the public more efficiently.

Saipem Middle East Cyber Attack

Saipem is an Italian oil services company. Its servers in the Middle East, especially in Saudi Arabia, the UAE and Kuwait, were affected by a cyber attack that originated from Chennai, India (Bloomberg, 2018). The attackers used a variant of a wiper malware called Shamoon, which was previously employed in a hack that affected over 30,000 computers offline at oil giant Saudi Aramco (Bloomberg, 2018). Approximately 400 servers were affected by the cyber attack (Bloomberg, 2018). A report by the company said that the attackers were attempting to obtain administrative data. However, there was no loss in data since all the systems had a backup. As a prime oil and gas champion, Saipem attracts a multitude of financially motivated and state-sponsored cyber attackers.

Analysis

The Saipem cyber attack creates a good picture of the extent of cybercrime in UAE, particularly, the adverse effects it can have on companies. In essence, the cyber attack led to the closure of the company shortly to evaluate the extent of the attack. The reporter uses well-researched information including details of similar attacks in the past. Additionally, he includes figures to support the report. A notable point he addresses is the need for companies to securely back up their data to minimize losses during attacks.

Evaluation

Based on the analysis, the report clearly illustrates the form of a cyber attack involved in the case. Additionally, the use of examples, previous data and figures ensure it achieves its purpose of informing people concerning cyber crimes efficiently.

'Wangiri Scam'

The fraud gets its name from a Japanese word Wangiri. 'Wan' means 'one' and 'giri' means 'hang-up' (Badam, 2018). Victims of this fraud receive a phone call from an overseas number that just rings once. Upon returning that call, the victims hear an advertisement for a subscription to a premium chat line or internet services. Victims incur hefty charges for the call that amount up to $50 a minute since they cannot disconnect the call until the recorded message ends (Badam, 2018). Criminal gangs are now targeting UAE customers with this cold calling phone fraud leaving them with huge bills. Rosa Bianchi, a marketing executive in Dubai, was lucky that when she returned the call, it could not get through (Badam, 2018). The criminals make money because, for premium rate numbers, they share the income with the telecom organization of the country from which the call originates.

The fraudsters also engage in phishing scams where they pretend to be from a victim's bank and ask victims for bank details or passwords. During the call, the fraudsters remotely hack the victims' phones through remote access tools (RATs). According to Abu Muadh, a software company owner argues that 52% of low-income earners lose approximately Dh100-200 while others get their phone balance consumed (Badam, 2018).

Analysis

From the overview of the media report, 'Wangiri' is a combination of diverse forms of cyber crimes including phishing, hacking, and e-fraud. Attackers use phone calls and texts to lure their victims. Such crimes result in financial theft in form of hefty phone bills that attackers share with telecom entities. Additionally, innocent people lose a lot of money when their bank accounts are hacked into. The publication uses examples and clear explanations of how attackers under 'Wangiri' operate. Such detailed descriptions are essential in enhancing reader or viewer understanding of the cybercrime.

Evaluation

Based on the analysis, the report clearly illustrates the forms of cyber attacks involved in the case. It defines key terms and uses evidence that increases the readers understanding. Additionally, the use of examples and figures ensures it achieves its purpose of informing people concerning cyber crimes efficiently.

Three Steal Cash from Bank Customers in e-fraud

Dubai Public Prosecution referred three people to the Criminal Court of First Instance to stealing large sums of money from bank customers electronically. According to Esmail Ali Madani, the head of Public Funds Prosecution, two of the suspects bribed a bank customer with Dh 100, 000, the third suspect, to compromise the clients' data (Al Shouk, 2018). One of the identified victims had Dh599, 500 in her account. The suspects confirmed to illegally acquiring the money with help from the bank employee.

The criminals downloaded the smart application of the bank and used the victim's phone SIM to activate it. They then transferred Dh583, 000 to one of their current accounts (Al Shouk, 2018). They then got a replacement credit card from the bank after the first defendant posed as the bank customer claiming that the card was lost. He then activated the card and withdrew Dh22, 000 from the bank's ATM and used Dh10, 000 to purchase jewelry (Al Shouk, 2018). Once the victim learned about the e-fraud, she contacted the bank, Etisalat and alerted the enforcement officers. The suspects were charged with utilizing unofficial documents to hack into an electronic system, unlawfully getting others' money, and offering and accepting bribes.

Analysis

The reporter's aim is to inform the public on e-fraud. The forms of cyber crimes described in this media report include hacking and credit card forgery. In particular, hacking is evident when the bank employee accesses the bank's electronic system without authorization using unofficial documents and transfers the victim's money to his fellow criminals. Likewise, credit card forgery is evident when one of the criminals poses as a customer and requests for a replacement for the credit card on the basis that it is lost. The report is based on conclusive research that gathers data from the head of Public Funds Prosecution. The report uses direct speech from the interviewee, which increases its credibility.

Evaluation

Notably, the media report achieves its aim of informing the public on cybercrime effectively. First, the title gives the reader a clear description of what the report entails. In addition, the reporter uses direct speech, which convinces the reader on the credibility of the reported information. Likewise, the indication of the...

Cite this page

Research Paper on Real-Life Cybercrimes in the United Arab Emirates. (2022, Nov 29). Retrieved from https://proessays.net/essays/research-paper-on-real-life-cybercrimes-in-the-united-arab-emirates

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism