Verified Document

Criminal Investigations: Changes In Cybercrime The Rate Essay

Criminal Investigations: Changes in Cybercrime The rate at which internet usage is growing is expeditious. The World Wide Web is fast eliminating the physical borders that originally existed between nations and individuals, and rapidly transforming the world into a global village. The conduct of business has been made easier, and so has education, sports, communication, to mention but a few. Thanks to the internet, people located miles away from each other, who would have otherwise been oblivious of each other's existence, or been able to communicate, can now relate at the touch of a button. This high degree of interaction is, however, also the cause of one of the most damaging cyber related concerns -- cybercrime.

Definition

Cybercrime, according to the Oxford Dictionary, is a crime "carried out by means of computers or the internet." Thus, any crime that makes use of a computer, either as a target, instrument, or as a medium for further crime perpetuation, falls within the confines of cybercrime (the Legal Dictionary, 2014). Therefore, unlike conventional crimes such as stealing, mugging, or robbing, cybercrime does not require the criminal's physical presence, which explains why its control and regulation is proving difficult (the Legal Dictionary, 2014).

Cybercrime against Persons

There are 3 key cybercrime categories. These include; cybercrime against persons, against property, and against government (Nandini, n.d.). Cybercrime against persons is the most common of the three, and law enforcement agencies all over the world are working hand-in-hand towards reducing its prevalence (the Legal Dictionary, 2014). The most common forms of cybercrimes against persons are; cyber-stalking, harassment via electronic mail, and "trafficking, distribution, posting and dissemination of obscene material, including pornography and indecent exposure" (Nandini, n.d.). In the...

The famous Ahmadabad case where a minor was almost Gang raped after being lured through a chat room conversation is a perfect example (Nandini, n.d).
How IT Prevalence has Changed Cybercrimes against Persons

Cybercrime against persons involves "infiltrating the trust of other users of a computer network for profit or gain" (Criminal Lawyer Group, 2014). In order to bring out the change brought about by IT prevalence, two periods (pre-2000 period and post-2000 period) which had different IT prevalence levels will be compared.

Pre-2000: In the pre-2000 period, cybercrimes were mostly one-man operations - centered at taking advantage of the glaring weaknesses in computer networks (Criminal Lawyer Group, 2014). Such crimes were, in most cases, carried out by computer nerds who were out to prove their toughness by revealing the weaknesses in computer systems (hacking). Rarely was cybercrime committed for profit or gain (Criminal Lawyer Group, 2014). Cybercrime against property was, therefore, more prevalent than that against persons, and was thus not considered a serious crime as such, especially because it usually did not result in tangible intentional damage (Criminal Lawyer Group, 2014).

Post-2000: The new millennium was accompanied by significant technological advancement. Internet usage became more prevalent, and computers became the most significant communication tools. Cybercrime too evolved; it was now no longer driven by ambition, but by the need to gain profit by exploiting other network users (Criminal Lawyer Group, 2014). Hackers realized that the internet provided a safe domain, through which one could gain profit and run a low risk of detection (Criminal Lawyer Group, 2014). The whole idea of hacking then changed;…

Sources used in this document:
References

Criminal Lawyer Group. (2014). Criminal Defense: The Evolution of Cybercrime from Past to the Present. Criminal Lawyer Group. Retrieved from http://www.criminallawyergroup.com/criminal-defense/the-evolution-of-cybercrime-from-past-to-the-present.php

Nandini, R.P. (n.d.). Cybercrime. Think Quest. Retrieved from http://library.thinkquest.org/06aug/02257/more.html

Texas AG. (2012). Criminal Investigations. Attorney General of Texas. Retrieved from https://www.texasattorneygeneral.gov/criminal/investigation.shtml

The Legal Dictionary. (2014). Internet Fraud. The Free Legal Dictionary. Retrieved from http://legal-dictionary.thefreedictionary.com/Internet+Fraud
Cite this Document:
Copy Bibliography Citation

Related Documents

Canadian Policies to Thwart Terrorist and Criminal
Words: 3624 Length: 11 Document Type: Research Paper

Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism Problems being faced due to Cyber-Crime in Today's World What is Identity Theft? How and Why Cyber-Crime Occurs? Why Cyber-Crime has become an Important Issue? How Release of Personal Information makes an Individual vulnerable to Identity Theft? Future Implications Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty

Cyber Crime and Technology Crime
Words: 4865 Length: 14 Document Type: Research Paper

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Australian Criminal Justice System Respond
Words: 3213 Length: 7 Document Type: Essay

Industries that face stiff competition may favor and encourage an aggressive approach from employees that produces rapid results, rather than thoughtful, strategic action. When the gains cannot be realized in the desired time frame, there is a temptation to implement short cuts; resulting in fraud." (Price; Norris, 2009) That however is not a justification, although it prompts some regulations on the way industries operate. The Law Catches Up Today the criminal

Offshore Financial Centres and Their
Words: 22477 Length: 60 Document Type: Dissertation

Because the home country is not required to reimburse foreign depositors for losses, there is no corresponding financial penalty for lax supervision; there is, though, a benefit to the country with lenient regulatory policies because of increased revenues generated and the employment opportunities these services provide (Edwards 1999). Furthermore, banks seeking to conduct multinational business are attracted to countries where incorporation laws and the regulatory framework offer less regulatory oversight

Crime Prevention in City X
Words: 1554 Length: 5 Document Type: Essay

Daytime Robberies in City X City X is facing nightmares of daytime robberies that have crippled social, economic, and political stability in the city. The police officers have failed to obtain adequate information related to the causes and the perpetrators of the robberies. Therefore, coming up with a plan to investigate the cases and end the situation is important to reduce the vice. The following essay discusses some of the

Globalization and Organized Crime Globalization
Words: 3395 Length: 12 Document Type: Research Paper

Thus, many shipments go to another destination before the United States or Europe in order to throw law enforcement off of the trail. For cocaine coming out of Colombia, West Africa and Venezuela, home to rogue states and dictatorships, have become popular transit hubs. The increased transportation of goods accompanying globalization has increased opportunities for maritime piracy. Organized crime is exploiting the increasingly dense international flow of commercial vessels. Maritime

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now