Verified Document

Deviance Internet Crimes Research Paper

Internet Crimes Deviance: Internet Crimes

The Internet has revolutionized everything, from communication and entertainment to business. By one estimate, the Internet contains approximately 487 billion gigabytes (i.e., 487 Exabyte's) of data, and by the end of 2010, there were more than two billion Internet users. Nearly one-quarter of these users are members of social networking sites such as Facebook. There are many reasons for the Internet's extraordinary growth, including its vast applications, anonymity, and global outreach. (Lynn, 2010).

However, many of the factors that have contributed to the Internet's success have also made it a dangerous place. Criminals now take advantage of the Internet to exploiting suspecting users for personal, political, and financial gain. The current essay is an exploration of the concept of internet scams and fraud. The author will discuss in detail how the internet fraud began and the way it is affecting the internet users. There will also be discussion of the internet fraud protection method. The author will also focus on the relation of criminals to the deviance theory.

Prevalence of Internet Crimes

There has been a considerable evolution in cybercrime from the days of troubled teenagers, demonstrating their technical skills, to highly organized criminal enterprises earning millions of dollars. The financial toll imposed by cybercrime is also met by other threats, including espionage, terrorism, and cyber-warfare. According to a report by CBS news (CBS News, 2010), cyber attacks targeting the power grid caused major blackouts that affected millions of people in Brazil in 2005 and 2007. Incidents of cyber-warfare were suspected in 2007, when Estonian officials relocated a Soviet war monument (Anderson, 2007) and again in 2008 during the conflict between Russia and Georgia over South Ossetia (Danchev, 2008). At the time, armies of compromised computers all over the world were instructed to launch distributed denial of-services (DDoS) attacks against many government web sites in Georgia and Estonia, effectively knocking them offline.

In 2009, at least 34 corporations (including Google) were the targets of coordinated cyber attacks dubbed Operation Aurora that leveraged an unknown vulnerability in Internet Explorer to install malicious software (malware) that was capable of stealing sensitive information and intellectual property. The perpetrators of the breach are still unknown, but evidence suggests individuals in China may have been involved (Zetter, 2008). In June 2010, reports surfaced of an advanced piece of malware that targeted industrial control systems with an unprecedented level of sophistication, including multiple exploits that targeted unpatched or unknown vulnerabilities (i.e., 0-day exploits). This level of sophistication led some experts to suspect that the attack was state-sponsored and intended for Iran's nuclear power plants (McMillan, 2010). All of these events exemplify the increasing threat imposed by cybercrime and motivate the need for better protection, detection, and mitigation strategies.

Internet Scams

In 2009, the FBI's Internet Crime Complaint Center (IC3) reported a loss of $559.7 million dollars as a result of cybercrime. That was more than double the losses based on complaints filed just one year earlier in 2008, estimated at $264.6 million dollars. Figure 1.1 displays the losses reported to the IC3 over the past nine years. Note that from 2001 to 2009, there was more than a thirty-fold increase in losses due to Internet crime. The largest cybercriminal theft to date was an operation led by an American named Albert Gonzalez, whose crew is estimated to have cost businesses more than $400 million dollars (Verini, 2010) between 2006 and 2008. Gonzalez's crime syndicates gained access to approximately 130 million credit card numbers by hacking into Heartland Payment Systems, one of the largest credit card processors in the world, and victimized companies including T.J. Maxx, Target, Dave & Busters, Office Max, Barnes & Noble, JC Penney, 7-Eleven, and Boston Market. Gonzalez was captured in 2008 and sentenced to 20 years in federal prison for his crimes. The number and cost of data breaches has exploded in recent years. Scholars have described that deviance occurs when criminal persons breach...

Later, malware started to take advantage of the network to propagate. Fast-spreading worms were among the first malware subjects that were studied in depth (Moore, 2003). Most malware today, on the other hand, contains malicious payloads that are designed for profit, and spread mainly through three methods: unsolicited bulk email (i.e., spam), drive-by-download exploits, and various forms of social engineering.
Despite many research and industrial efforts, there is a large and increasing amount of malicious traffic in the Internet today. This includes, flooding and other (Distributed) Denial-of-Service (DDOS) attacks, email spam, click fraud attacks, reconnaissance scanning and worm propagation. In the last eight years, the volume of the largest DDOS attack reported has nearly doubled every year, from 400 Mbps in 2002 to 49 Gbps in 2009, and this trend is anticipated to hold in the near future. The number of email spam has grown steadily to reach about 84% of total email messages in 2010. Click fraud has become the third major thread in the Internet, after DDOS attacks and email spam, and it arguably represents the biggest threat to the Internet advertising industry, which sustains a wide range of free Internet services. (Arbor Networks, 2009). Here is another aspect of deviance which is related to internet users who fell prey to these spam emails. Thus except knowing that these e-mails are just waste of time as well as risk to loss of money they still check these spam emails.

Organized Criminal Networks & Law enforcement Agencies

As a result of internet crimes, a thriving underground economy has emerged to provide a marketplace for miscreants to exchange their services. There are far reaching implications to this underground economy, with businesses losing more than $1 trillion dollars annually. Within the Internet's underground economy are players with various levels of expertise that fulfill different roles. There are specialists in writing software, computer networking, counterfeiting, and money laundering. These criminals are assisted by the fact that the Internet spans the globe, and many countries do not hold electronic crimes to the same standard and severity as tangible crimes (e.g., sending unsolicited bulk email is legal in Russia). In particular, countries in Eastern Europe and Asia are suspected of harboring cybercriminals. The law enforcement in some of these countries may be corrupt, while others simply lack the resources to combat electronic threats. (Viveros, 2009)

As a result, highly-organized criminal networks have formed with business structures similar to legitimate corporations (F. Paget, 2009). For example, an organization known as Innovative Marketing (IM) operated out of Ukraine and is estimated to have defrauded victims of more than $180 million dollars. IM employed more than 600 people, including customer service and technical support staff in call centers all over the world (TrendMicro, 2010).

The most popular method of networking for cybercriminals is through online forums that serve specific communities such as spam, credit card theft (i.e., carding), and malware. These underground forums aid criminals in buying, selling, and exchanging services. Interestingly, these forums have recently been increasingly scrutinized by international law enforcement agencies.

In several instances, law enforcement agencies have been successful in infiltrating and arresting perpetrators using these forums. As an example, over the course of two years, beginning in 2006, the FBI conducted an undercover sting that garnered the trust of the highest-ranking members of a popular carding forum known as Dark Market, even convincing the operators to move the entire forum onto servers controlled by the FBI. The operation led to the arrests of more than 60 people involved in financial theft, and it prevented an estimated loss of more than $70 million dollars. In April 2010, law enforcement seized the CardingWorld.cc and CallService.biz forums and arrested several of the ringleaders. CardingWorld.cc provided services to members interested in buying and selling stolen financial data, and CallService.biz was…

Sources used in this document:
References

Anderson, N. (2007). Massive DDoS Attacks Target Estonia; Russia Accused Retrieved from http://arstechnica.com/security/news/2007/05/massive-ddos-attacks-target-estonia-russia-accused.ars.

Arbor Networks (2009) Attack Report retrieved from http://www.arbornetworks.com/report.

CBS News (2010). Cyber War: Sabotaging the System. 60 Minutes Broadcast.

Danchev, D. (2008). Coordinated Russia vs. Georgia Cyber Attack in Progress. Retrieved from http://www.zdnet.com/blog/security/coordinated-russia-vs.-georgia-cyber-attack-in-progress/1670.
IC3. (2009). Internet Crime Report Retrieved from http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf, 2010.
Lynn, J. (2010). Internet Users to Exceed 2 Billion This Year Retrieved from http://www.reuterscom/article/idUSTRE69I24720101019.
http://www.pcworld.com/businesscenter/article/205827/was_stuxnet_built_to_attack_irans_nuclear_program.html.
Paget, F. (2009). Cybercrime Organizations Turn to 'Mafia-Style' Structure. Retrieved from http://blogs.mcafee.com/mcafee-labs/mafia-style-cybercrime-organizations.
Verini, J. (2010). The Great Cyberheist. Retrieved from http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?pagewanted=1&_r=1
Viveros, S. (2009). Businesses Lose More Than $1 Trillion in Intellectual Property Due to Data Theft and Cybercrime. Retrieved from http://www.mcafee.com/us/about/press/corporate/2009/20090129_063500_j.html
Zetter, K. (2008). Google Hack Attack Was Ultra Sophisticated, New Details Show. http://www.wired.com/threatlevel/2010/01/operation-aurora/
Cite this Document:
Copy Bibliography Citation

Related Documents

Deviance Among Canadian Youths Deviation Refers to
Words: 957 Length: 3 Document Type: Essay

Deviance Among Canadian Youths Deviation refers to the violation of the acceptable norms and values that have maintained within the cultural framework of a society. Norms are very important in every society since they allow the people of a given society to coexist with one another, and create the best environment for human living. The Canadian society like other societies is guided by certain norms and values, which are useful for

Deviance Proposition: The Main Purpose
Words: 823 Length: 2 Document Type: Research Paper

The issue remains widely debatable, with some insisting the behavior in the jails need to be reevaluated yet some insist on the societal emphasis in curbing recidivism. The prison systems have also failed in reduction of recidivism through a failure to insist and implementation of programs that equip the inmates with the relevant and appropriate skills in lie with their interest and the environment from where they are. The offenders

Deviance Biography
Words: 676 Length: 2 Document Type: Term Paper

Deviance Biography Susan Smith was born into a traditional, middle class family. One of five daughters, Susan displayed a higher willingness to shoulder responsibility than her siblings at a very early age, which led to her parents' turning to her, for support, very frequently. The support sought was initially in the form of household chores, and then financial, once Susan was able to work, and especially after her marriage to a

Deviance As a Sociological Term
Words: 2129 Length: 7 Document Type: Term Paper

The common perception of organized crime as consisting of tightly knit underworld syndicates who operate on the periphery of the legitimate business world is a misconception. It was illustrated as such in a most public way with the revelation of the Savings and Loan Scandal which swept through dozens of fronts that posed as banking institutions during the 1980's. With the revelation that there was a direct and demonstrable relationship

Deviance Refers to Behaviors That
Words: 1838 Length: 4 Document Type: Essay

Yet instead, Glass had the savvy of knowing which way opinion was sliding, and simply say what most of the readers were already thinking. Had his pieces been billed OpEd, the discussion would be over. Instead, he mistakenly purposed his facts as just that, and thus moved from unbiased journalism to political and social pundit -- certainly no guiltier of lying that most High School Paper editors, but certainly

Deviance in Film Analysis
Words: 1308 Length: 4 Document Type: Essay

Film And Book Analysis Donna and Entry Level Deviance In accordance to the cultural-transmission theory, deviance is a behavior that is learnt by means of interacting with others. Basically, individuals end up learning from other individuals who take part in deviant norms and also possess and display deviant values. Donna largely represent entry level deviance in the sense that she hangs out with cocaine and substance D addicts, but does not alter

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now