Verified Document

Cybercrime What's In A Name  Term Paper

According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four primary categories, which include: unauthorized access to computer programs and files, unauthorized disruption, theft of identity, and carrying out of traditional offenses, such as distribution of child pornography, using a computer (Piazza 2006).

Ditzion, Geddes and Rhodes (2003) contend that due to the myriad of diverse computer related offenses, nothing less than the definition by the U.S. Department of Justice (DOJ) would suffice. The DOJ generally defines computer crime as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution." (Ditzion, Geddes & Rhodes, 2003)

The term "computer crime" not only includes traditional crimes committed using a computer, but also numerous technology-specific criminal behaviors technologies and the exponential expansion of the Internet have spawned. The Internet has also spawned numerous "cyberthreats," which can basically be defined as "using computer technology to engage in activity that undermines a society's ability to maintain internal or external order" (Brenner, 2007). As cyberspace spawns opportunities for individuals and groups to remotely commission attacks, they usually maintain their anonymity. More often than not, cybercriminals are not apprehended and remain unidentified (Brenner 2007)

No International Borders

Kumar (2002) notes cybercrime has spawned deep roots into cyberspace and that sophisticated cybercriminals and terrorists associated with drug trafficking, terrorist outfits regularly employ the Internet for anti-social, anti-national and criminal activities. He warns that "The criminals can move on a highway at the speed of light on which there are no traffic signals, no constables, without international border with no custom or immigration authorities to call the criminal to halt. Terrorist groups deftly utilize the Internet to pass on information to execute various terrorist acts, which, because they utilize computers, present serious negative impact on human life. "The cyber-terrorists have even acquired the capability to penetrate computer systems using 'logic bombs' (coded devices that can be remotely detonated), electro magnetic pulses and high-emission radio frequency guns, which blow a devastating electronic wind through a computer system. The hackers have gone to the extent of distributing free hacking software -- Rootkit, for instance -- to enable an intruder to get root access to a network and then control as though they were the system's administrators (Kumar 2002)."

The Cybercrime Scope Depending on the scope of the crime, Internet-related crimes, no matter what the name, like crimes committed offline, should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international levels. Primary federal law enforcement agencies that investigate domestic Internet crimes include: the Federal Bureau of Investigation (FBI), the United States Secret Service, the United States Immigration and Customs Enforcement (ICE), the United States Postal Inspection Service, and the Bureau of Alcohol, Tobacco and Firearms (ATF). The following Table (1) identifies a number of cybercrimes and the appropriate law enforcement agency for reporting the crime.

Table 1: Cybercrimes and Law Enforcement Agencies (Computer Crimes 2008)

Type of Crime

Appropriate Federal Investigative

Law Enforcement Agencies

Computer intrusion (i.e. hacking)

FBI local office

U.S. Secret Service

Internet Crime Complaint Center

Password trafficking

FBI local office

U.S. Secret Service

Internet Crime Complaint Center

Counterfeiting of currency

U.S. Secret Service

Child Pornography or Exploitation

FBI local office if imported,

U.S. Immigration and Customs Enforcement

Internet Crime Complaint Center

Child Exploitation and Internet Fraud matters that have a mail nexus

U.S. Postal Inspection Service

Internet Crime Complaint Center

Internet fraud and SPAM

FBI local office

U.S. Secret Service (Financial Crimes Division)

Federal Trade Commission online complaint) if securities fraud or investment-related SPAM e-mails,

Securities and Exchange Commission online complaint)

Sabotage of computer systems or computer networks;
b. Sabotage of operating systems and programmes;

c. Theft of data/information (this is the fastest growing computer-related crime);

d. Theft of intellectual property, such as computer software;

e. Theft of marketing information; and f. Blackmail based on information gained from computerized files, such as medical information, personal history, sexual preferences, financial data, etc. (Kumar 2002).

The computer serves as the instrument of a crime.

a. Fraudulent use of Automated Teller Machine (ATM) cards and accounts;

b. Credit card frauds;

c. Frauds involving electronic funds transfers;

d. Telecommunication Frauds; and e. Frauds relating to Electronic Commerce and Electronic Data Interchange.

Theft of Intellectual Property Rights is also part of cyber space burglars. In USA alone, the Fortune 1000 companies suffer a loss of about 300 billion dollars annually on this account (Kumar 2002).

Even though an increased awareness exists regarding the significance of international cybersecurity, along with measures taken to improve capabilities, cyber risks continue to underlie national and global information networks, as well as critical systems they manage. To decrease risks requires unprecedented, active partnership among diverse components various countries around the globe (Computer Crimes 2008) - no matter what the name of the crime.

Bibliography

Bartlett, John, comp. Familiar Quotations, 10th ed, rev. And enl. By Nathan Haskell Dole. Boston: Little, Brown, 1919; Bartleby.com, 2000.

A www.bartleby.com/100/.Available from: http://www.lib.flinders.edu.au/services/infolit/nureference.pdf[08 March 2008].

Brenner, Susan W. "At Light Speed" Attribution and Response to Cybercrime/terrorism/warfare." Journal of Criminal Law and Criminology 97.2 (2007): 379+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5021769883[08 March 2008].

Computer Crime & Intellectual Property Section United States Department of Justice 2008. Available from: http://www.cybercrime.gov/reporting.htm[08 March 2008].

A cybercrime. 2008 in Encyclopedia Britannica. Retrieved March 8, 2008, from Encyclopedia Britannica Online. Available from: http://www.britannica.com/eb/article-235868[08 March 2008].

Cybercrime: Uncovered February 13, 2008 Computer Crime Research Belfasttelegraph.co.uk Center. Available from: http://www.crime-research.org/analytics/cybercrime1302/[08 March 2008].

Cyberspace N.d. Available from: http://astro.uchicago.edu/~randy/2005.shortcourse/05.sc.images.web/adler.cyberspace.jpg [08 March 2008].

A www.britannica.com/eb/author?id=4346" Dennis, Michael Aaron 2008 Cybercrime. (2008). Available from: Encyclopedia Britannica online. http://www.britannica.com/eb/article-9001623/cybercrime[08 March 2008].

Ditzion, Robert, Elizabeth Geddes, and Mary Rhodes. "Computer Crimes." American Criminal Law Review 40.2 2003: 285+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5002004951[08 March 2008].

Jones, Benjamin R. "Comment: Virtual Neighborhood Watch Open Source Software and Community Policing against Cybercrime." Journal of Criminal Law and Criminology 97.2 2007: 601+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5021769900[08 March 2008].

Kumar, Atul 2002 Cyber Crime - Crime without Punishment. Available from: http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan002368.pdf

Pangaro, Paul 2007 CYBERNETICS -- " a Definition. Available from: http://www.pangaro.com/published/cyber-macmillan.html[08March 2008].

Piazza, Peter. "When Cybercriminals Turn Pro." Security Management May 2006: 48+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5014891489[08 March 2008].

Whittaker, Jason. The Cyberspace Handbook. London: Routledge, 2004. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=104264841[08 March 2008].

Sources used in this document:
Bibliography

Bartlett, John, comp. Familiar Quotations, 10th ed, rev. And enl. By Nathan Haskell Dole. Boston: Little, Brown, 1919; Bartleby.com, 2000.

A www.bartleby.com/100/.Available from: http://www.lib.flinders.edu.au/services/infolit/nureference.pdf[08 March 2008].

Brenner, Susan W. "At Light Speed" Attribution and Response to Cybercrime/terrorism/warfare." Journal of Criminal Law and Criminology 97.2 (2007): 379+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5021769883[08 March 2008].

Computer Crime & Intellectual Property Section United States Department of Justice 2008. Available from: http://www.cybercrime.gov/reporting.htm[08 March 2008].
A cybercrime. 2008 in Encyclopedia Britannica. Retrieved March 8, 2008, from Encyclopedia Britannica Online. Available from: http://www.britannica.com/eb/article-235868[08 March 2008].
Cybercrime: Uncovered February 13, 2008 Computer Crime Research Belfasttelegraph.co.uk Center. Available from: http://www.crime-research.org/analytics/cybercrime1302/[08 March 2008].
Cyberspace N.d. Available from: http://astro.uchicago.edu/~randy/2005.shortcourse/05.sc.images.web/adler.cyberspace.jpg [08 March 2008].
A www.britannica.com/eb/author?id=4346" Dennis, Michael Aaron 2008 Cybercrime. (2008). Available from: Encyclopedia Britannica online. http://www.britannica.com/eb/article-9001623/cybercrime[08 March 2008].
Ditzion, Robert, Elizabeth Geddes, and Mary Rhodes. "Computer Crimes." American Criminal Law Review 40.2 2003: 285+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5002004951[08 March 2008].
Jones, Benjamin R. "Comment: Virtual Neighborhood Watch Open Source Software and Community Policing against Cybercrime." Journal of Criminal Law and Criminology 97.2 2007: 601+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5021769900[08 March 2008].
Kumar, Atul 2002 Cyber Crime - Crime without Punishment. Available from: http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan002368.pdf
Pangaro, Paul 2007 CYBERNETICS -- " a Definition. Available from: http://www.pangaro.com/published/cyber-macmillan.html[08March 2008].
Piazza, Peter. "When Cybercriminals Turn Pro." Security Management May 2006: 48+. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=5014891489[08 March 2008].
Whittaker, Jason. The Cyberspace Handbook. London: Routledge, 2004. Questia. Available from: http://www.questia.com/PM.qst?a=o&d=104264841[08 March 2008].
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Crime Malicious Activities Like Identity Theft,
Words: 2334 Length: 7 Document Type: Term Paper

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Cyber Crime a Rising Problem
Words: 1028 Length: 3 Document Type: Research Paper

Cyber Crime: Threats and Preventive Measures / Cyber Crime: A Rising Problem Methods Used to Commit Cyber Crime Methods Used to prevent Cyber Crime The area of cybercrime is growing rapidly. An increasing number of criminal-minded individuals are taking advantage of the unrecognizability, speed, and convenience offered by the Internet, for perpetrating a variety of crimes, which know no bounds, either virtual or physical, causing grave harm and posing very real risks to

Cybercrimes Cyber Prevention an Analysis
Words: 2419 Length: 8 Document Type: Research Paper

Cyber Crime Cybercrime has been a hot button topic in recent years. A crime involving digital services or computers, cybercrimes typically is when someone targets a computer for a crime, uses a computer as a tool for a crime, or has computer containing evidence of a crime. Since the rise of information technology, cybercrime has become taken center stage as a shift in criminal activity means more criminals doing business online

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now