Cybercrime can be limited to the online environment or it can involve other crimes
For example, someone might try to unlawfully access your social media account to get their hands on your personal information or photos, which they could then use to blackmail or threaten you. Cybercrime can also take place as part of a larger criminal picture, targeting multiple individuals or companies.
The law is also in force online. Even if something is possible online, this does not make it legal.
Cybercrimes have serious consequences for both the perpetrator and the victim. Even an act intended as a joke or a prank can cause significant harm. It is often difficult for the perpetrator to ascertain the full extent of the impact of a cyberattack. For example, a denial-of-service attack on a school’s systems intended as a prank could accidentally crash the municipal health centre’s systems, putting patients at risk and causing tens of thousands of euros in damage. Even a person under the age of 15 is liable to compensate for the damage they have caused.
Criminals may lure others to engage in cybercrime activities online. For example, you may be asked to perform various tasks in exchange for a small reward. Criminal activity can also be made more attractive by turning it into a game where criminal acts are scored and the person with the most points is at the top of the leaderboard. The aim is to make criminal acts more interesting to carry out and to commit the person to committing crimes in the future. In reality, the score statistics are meaningless, they are only a means of enticing people to carry out crimes.
People may also be enticed under the guise of ideological reasons. For example, criminals may claim that a certain company is acting wrongfully and ask people to carry out denial-of-service attacks against it. Even if you think you are acting for a good cause, a cyberattack can be a crime. It can also be difficult to ascertain who the real target of the attack is and what the attack will affect.
Ignorance of the consequences of an action does not remove criminal liability. If something is illegal offline, it is likely to be illegal online as well.
What should I do if I come across harmful content online?
You can report content that violates the terms of use or is illegal directly to the online platform where you found the content. Sites usually have a “report” button. You can file a report even if you are not sure which terms of use the content violates. It is the platform’s responsibility to investigate the report and, if necessary, to remove the harmful content.
What should I do if someone asks me online to participate in an activity that I suspect is criminal?
Don’t hesitate to tell an adult you trust about it. You don't have to deal with a stressful situation on your own. It's always a good idea to tell an adult you trust about suspicious requests. You can also make an online tip-off to the police about the situation. You can find the form on the police website at poliisi.fi/en/net-tip. If you suspect that you have been the target of a crime, such as threats or blackmail, file a police report with the police. It's a good idea to capture suspicious messages, by taking a screenshot, for example. This will help the police to investigate the matter.
What should I do if I suspect that I’ve been the victim of a crime?
It’s always worth filing a police report of a suspected crime. You can file a police report online at poliisi.fi or at your nearest police station. You do not need to be sure whether or not a crime is involved. After receiving the report, the police will begin to investigate what happened and investigate whether a crime has taken place in the situation. It’s also a good idea to always tell an adult you trust about the matter. You can fill out the police report together, for example with your parents, or take a friend with you to support you at the police department.
It's a good idea to capture any material related to the suspected crime. For example, you can take a screenshot of the messages you received and the sender's profile, and save any log information and IP addresses.