Studyspark Study Document

Computer Crime Can Be Classified Term Paper

Pages:4 (1216 words)

Sources:4

Subject:Technology

Topic:Computer Viruses

Document Type:Term Paper

Document:#80690030


Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of phishing and identity fraud are more easily carried out in countries with less lax laws regarding computer crime, fraud, embezzlement, and identity theft than in the United States (Lovet, 2007). However, one of the largest cases of consumer identity theft was carried out in the United States this year, when "at least 45.7 million credit and debit cards was stolen by hackers," (Swetenham, 2007).

Especially since September 11, law enforcement officials in the United States have been increasingly concerned about the possibility of cyberterrorism: the use of computer systems to harm or kill people. No act of cyberterror has been documented. However, all major public systems currently rely on computerized control systems and databases that, if tampered with, could cause serious damage. For example, hydroelectric dams are controlled and monitored by computers. Public transportation systems also depend on computer controls and monitoring. A terrorist who hacked into one of these systems could cut off a city's power, or trap millions of passengers in public transportation vehicles.

In 2004, the Council of Europe enacted a trans-national treaty regarding the prevention and prosecution of computer crime. The United States agreed to get on board with the convention in January 2007. The treaty largely targets organized crime and was designed to "protect citizens against computer hacking and Internet fraud, as well as crimes involving electronic evidence, including child sexual exploitation, organized crime and terrorism," (McCormack, 2006). The treaty does not address the problems of hacking and cracking directly, unless those activities are designed to perpetrate fraud or organized criminal activities and especially when those crimes crossed national boundaries.

Computer crime can also include what is known as "cracking." Like hacking, cracking can be maverick attempts at practical jokes like replacing a Microsoft corporate logo with picture of a donkey or inserting pornographic images onto a government web site. Laws against cracking vary state-by-state. Some forms of computer crime are outright strange, like the "happy slapping" incidents in Europe in which a ring of low-grade cybercriminals arranged public assaults of strangers. The "cruel and sometimes lethal form of entertainment" involved filming the attacks on cellular phone cameras, the images then posted online (Swetenham, 2007).

The United States Department of Justice lists a litany of cases prosecuting cybercriminals, showing that computer crimes are widespread and increasing in prevalence. As increasing numbers of people become computer literate, the digital universe becomes saturated with malicious users who seek to commit any number of offenses ranging from child pornography web rings to identity theft to hacking to acts of terror. Combating computer crimes will require aggressive efforts and sensible legislation.

References

BBC (2004). Hot topics: Computer viruses. November 2004. Retrieved April 18, 2007 at http://www.bbc.co.uk/science/hottopics/computerviruses/crime.shtml

Lovet, G. (2007). How cybercrime operations work;; and how they make money. Retrieved April 18, 2007 at http://www.crime-research.org/analytics/2524/

McCormack, S. (2006). United States Joins Council of Europe Convention on Cybercrime. United States Department of State. Retrieved April 18, 2007 at http://www.state.gov/r/pa/prs/ps/2006/73353.htm

Swetenham, R. (2007). Quick links. Retrieved April 18, 2007 at http://www.qlinks.net/quicklinks/comcrime.htm

United States Department of Justice (2007). Computer Crime Cases. Retrieved April 18, 2007…


Sample Source(s) Used

References

BBC (2004). Hot topics: Computer viruses. November 2004. Retrieved April 18, 2007 at http://www.bbc.co.uk/science/hottopics/computerviruses/crime.shtml

Lovet, G. (2007). How cybercrime operations work;; and how they make money. Retrieved April 18, 2007 at http://www.crime-research.org/analytics/2524/

McCormack, S. (2006). United States Joins Council of Europe Convention on Cybercrime. United States Department of State. Retrieved April 18, 2007 at http://www.state.gov/r/pa/prs/ps/2006/73353.htm

Swetenham, R. (2007). Quick links. Retrieved April 18, 2007 at http://www.qlinks.net/quicklinks/comcrime.htm

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Computer Security People, Process and Technology Are

Pages: 15 (4780 words) Sources: 10 Subject: Business - Management Document: #8293866

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Studyspark Study Document

Computer Security Although It Is Never Possible

Pages: 2 (687 words) Sources: 1+ Subject: Education - Computers Document: #10678846

Computer Security Although it is never possible to fully prevent the unauthorized use of information from people with security clearances and access, the use of security clearance and access is important to ensure that people without security clearance cannot access the confidential information. In other words, the concept of 'absolute security' is a chimera. It is the nature of security that makes it necessary to weigh up the threats, the risks,

Studyspark Study Document

Computer Security Information Warfare Iw

Pages: 20 (5531 words) Sources: 25 Subject: Military Document: #21422307

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Studyspark Study Document

Crime the Purpose of This

Pages: 10 (2753 words) Sources: 4 Subject: Sports - Drugs Document: #71668087

Many people using illicit and illegal drugs often have no impulse control and may turn violent or to another form of crime. Once an individual's mind is altered from the constant use of drugs, he or she will often steal, lie, and cheat to make the next dollar to obtain more drugs. Many people could share family related drug stories that have led to criminal activities. About 10 years ago,

Studyspark Study Document

Laws on Cyber Crimes

Pages: 10 (2997 words) Sources: 10 Subject: Education - Computers Document: #49682679

Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On

Studyspark Study Document

Computer Forensics for Preventing Email

Pages: 17 (4655 words) Sources: 10 Subject: Education - Computers Document: #56803454

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Join thousands of other students and

"spark your studies".