Cybercrime, Cybercriminals, And Cybercops
Cybercrime
Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such as stemming the losses incurred from identity theft, but the virtual landscape changes so rapidly that new threats and criminal tactics are constantly emerging.
Cybercrime, Cybercriminals, and Cybercops
Cybercrime is formally defined by the Canadian Police College as illegal activity which depends materially on the use of computers to commit crimes or when computers are the object of the crime (Kowalski, 2008, p. 5-6). A contemporary example of the use of computers in criminal activity would be hacking into bank records over the internet to steal passwords and account numbers. This essay will briefly examine the history of cybercrime, how computer technology has changed the manner of criminal activity, and what law enforcement has been doing in response.
Over Forty Years of Violence
As soon as computers began to be put into use they became the targets of human frustration by disgruntled operators, employees, or business customers. Beginning in the 1960s, computer systems all over the world began to be shot with guns, bombed, held hostage, kidnapped for ransom, burned, stabbed, and sabotaged (Kabay, 2008, p. 5-6). Since this early period in computing history little has changed, as shown by a 2001 survey that revealed 25% of all computers have probably been physically assaulted. Although many of these assaults were committed by the computer's owner and therefore not a crime, there's no reason to believe workplace computers would be immune from this type of violence.
Identity Theft
The current epidemic of identity theft has its roots in credit card fraud, which began almost as soon as they became widely available in the 1950s and 1960s (Kabay, 2008, p. 11-13). For example, victims would often find themselves facing a huge credit card bill from a bank they didn't remember requesting a card from. Although law enforcement quickly recognized the threat this criminal activity represented, the global losses to Visa and Master Card increased from 110 million in 1980 to 1.63 billion in 1995. With the advent of the internet, credit card fraud expanded into all aspects of the victim's financial life. By 2010, 8.6 million U.S. households were estimated to have been victimized by identity theft (Langton, 2011, p. 4-5). This represents an increase from an estimated 6.4 million households in 2005, yet the overall financial losses remained constant at 13.3 billion dollars.
Data Diddling
As data banks of information began to accumulate on tape drives, and eventually hard drives, it was unavoidable that someone would want to access that information so that it could be altered. "Data diddling" exploits have involved bank records, payrolls, inventories, credit reports, school records, and billing data (Kabay, 2008, p. 17). Massive frauds have been committed through manipulation of data, sometimes yielding big paydays for the criminals. The ability of thieves to engage in this activity has only increased with the advent of the internet and is limited only by the security precautions taken by the targeted organizations. A form of data diddling, "Salami Fraud," involves stealing tiny sums from multiple accounts to avoid detection (Kabay, 2008, p. 19). Over a period of time, depending on how large the account data base is, vast sums can be stolen.
Malware - Malicious Software or Code
Logic bombs and the subcategory time bombs are used to activate destructive programs when certain conditions are met or on a specific date (Kabay, 2008, p. 20). One use of such programs was demonstrated by Michael Lauffenburger in 1992, after he left a logic bomb at General Dynamics that would be sufficiently destructive to result in call back. Trojan programs appear to be useful or at least harmless, but are instead malicious (Kabay, 2008, p. 23-24). Trojan programs began to appear as soon as user groups began to form in the 1970s. In 2005, Homeland security stated that Trojans buried in emails represent the biggest security threat facing computer users and networks. Some Trojans are designed to infiltrate a computer to record keystrokes, thus providing cybercriminals with security passwords and other valuable information. "Chipping" refers to unauthorized modifications of ROM instructions in otherwise innocuous hardware, which leads to the theft of information, interference with computers or network performance, or the destruction of information. The...
Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only
Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in
MYTH: Decriminalizing prostitution would save a lot of money because police wouldn't have to arrest prostitutes or johns or pimps. FACT: Decriminalization of prostitution has resulted in expensive legal challenges because no one wants prostitution zoned into their neighborhood or near their kids' schools. Mustang Brothel was shut down because of tax evasion. Pimps are simply not going to hand over the massive profits that they make from the business of
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Cyber-Bullying Bullying may be a practice that has been around since the beginnings of human history, but with the increasing access that people have to technology a new medium is now used by aggressors. Cyber bullying is an act that involves using computers, cell phones and other sorts of media to consistently harass others. The object of the bullying, to cause physical or psychological damage to another, is the same, but
Cyber Bullying and Its Impact Over the past decade, attention has been drawn to cyber-bullying by the media and researchers. Research on cyber-bullying has covered the various behavior aspects; focusing mainly on demographic and personal factors of the involved individuals. Particularly, the research has been targeted at factors among adolescents; who account for a majority of cyber-bullying cases. Nonetheless, it is important that other populations are studied too -- even adults
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now