Verified Document

History Of Cyber Crimes Essay

Cybercrime, Cybercriminals, And Cybercops Cybercrime

Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such as stemming the losses incurred from identity theft, but the virtual landscape changes so rapidly that new threats and criminal tactics are constantly emerging.

Cybercrime, Cybercriminals, and Cybercops

Cybercrime is formally defined by the Canadian Police College as illegal activity which depends materially on the use of computers to commit crimes or when computers are the object of the crime (Kowalski, 2008, p. 5-6). A contemporary example of the use of computers in criminal activity would be hacking into bank records over the internet to steal passwords and account numbers. This essay will briefly examine the history of cybercrime, how computer technology has changed the manner of criminal activity, and what law enforcement has been doing in response.

Over Forty Years of Violence

As soon as computers began to be put into use they became the targets of human frustration by disgruntled operators, employees, or business customers. Beginning in the 1960s, computer systems all over the world began to be shot with guns, bombed, held hostage, kidnapped for ransom, burned, stabbed, and sabotaged (Kabay, 2008, p. 5-6). Since this early period in computing history little has changed, as shown by a 2001 survey that revealed 25% of all computers have probably been physically assaulted. Although many of these assaults were committed by the computer's owner and therefore not a crime, there's no reason to believe workplace computers would be immune from this type of violence.

Identity Theft

The current epidemic of identity theft has its roots in credit card fraud, which began almost as soon as they became widely available in the 1950s and 1960s (Kabay, 2008, p. 11-13). For example, victims would often find themselves facing a huge credit card bill from a bank they didn't remember requesting a card from. Although law enforcement quickly recognized the threat this criminal activity represented, the global losses to Visa and Master Card increased from 110 million in 1980 to 1.63 billion in 1995. With the advent of the internet, credit card fraud expanded into all aspects of the victim's financial life. By 2010, 8.6 million U.S. households were estimated to have been victimized by identity theft (Langton, 2011, p. 4-5). This represents an increase from an estimated 6.4 million households in 2005, yet the overall financial losses remained constant at 13.3 billion dollars.

Data Diddling

As data banks of information began to accumulate on tape drives, and eventually hard drives, it was unavoidable that someone would want to access that information so that it could be altered. "Data diddling" exploits have involved bank records, payrolls, inventories, credit reports, school records, and billing data (Kabay, 2008, p. 17). Massive frauds have been committed through manipulation of data, sometimes yielding big paydays for the criminals. The ability of thieves to engage in this activity has only increased with the advent of the internet and is limited only by the security precautions taken by the targeted organizations. A form of data diddling, "Salami Fraud," involves stealing tiny sums from multiple accounts to avoid detection (Kabay, 2008, p. 19). Over a period of time, depending on how large the account data base is, vast sums can be stolen.

Malware - Malicious Software or Code

Logic bombs and the subcategory time bombs are used to activate destructive programs when certain conditions are met or on a specific date (Kabay, 2008, p. 20). One use of such programs was demonstrated by Michael Lauffenburger in 1992, after he left a logic bomb at General Dynamics that would be sufficiently destructive to result in call back. Trojan programs appear to be useful or at least harmless, but are instead malicious (Kabay, 2008, p. 23-24). Trojan programs began to appear as soon as user groups began to form in the 1970s. In 2005, Homeland security stated that Trojans buried in emails represent the biggest security threat facing computer users and networks. Some Trojans are designed to infiltrate a computer to record keystrokes, thus providing cybercriminals with security passwords and other valuable information. "Chipping" refers to unauthorized modifications of ROM instructions in otherwise innocuous hardware, which leads to the theft of information, interference with computers or network performance, or the destruction of information. The...

Defense Department's official policy is to avoid all Chinese software and hardware out of fear that they might contain Trojan programs. This policy is hard to enforce given the fact that non-Chinese programs and hardware are frequently counterfeited in China (Kabay, 2008, p. 27).
Viruses and worms are other forms of malware that mainly destroy the efficiency of computers or systems by clogging pipelines in denial-of-service attacks, or by destroying files. The authors of such programs claim they are revealing weaknesses in computer and network security, but the word "terrorist" seems more appropriate. Spam represents unsolicited emails sent to recipients all over the world, typically for the purpose of soliciting money legally or illegally, and began to emerge as the internet took off in the mid-1990s. By 2007, 88% of all email traffic content was spam.

Phone Phreaking

Phone phreaking began as soon as telephone systems were put into use (Kabay, 2008, p. 14). Teenage boys were initially hired by AT&T in the late 1870s to act as switchboard operators, but the "… combination of power, technical mastery, and effective anonymity seemed to act like catnip on teenage boys." Eventually the bad behavior and pranks became so prevalent that AT&T stopped using boys as operators.

Josef Engressia (aka Joybubbles) was seven years old in 1957 when he began to mimic the 2600 Hz pitch AT&T used for its long distance phone system, which allowed him to make free calls to anywhere in the world. John Draper (aka Cap'n Crunch) began to use the whistles that came in the bottom of the cereal boxes of the same name to also gain access to AT&T's long-distance phone system, a tactic suggested to him by Josef Engressia. Rather than continue to use the toy whistles though, Draper built tone synthesizers that were called "blue boxes." The blue boxes quickly became prevalent among computer neophytes and others in the 1970s and the Apple founders Steve Wozniak and Steve Jobs even went through a period of phone phreaking the Vatican in Rome by pretending to represent Henry Kissinger.

Hacking

Phone phreaking eventually evolved into computer hacking (Kabay, 2008, p. 15). One of the first hackers to gain notoriety was Kevin Poulsen, who at 17-year of age in 1982 found himself being raided by the Los Angeles County District Attorney's Office for gaining unauthorized access to the U.S. military's ARPANET computers, the precursor to the internet. Subsequent intrusion exploits at Pacific Bell garnered the attention of the FBI, based on the fear that he could be stealing state secrets by virtue of his secret security clearance. This forced Poulsen to go underground for about four years until he was eventually arrested, but during this underground period he was able to survive in part by 'gaming' radio station call-in contests by hacking Pacific Bell computers. Although the espionage charge was eventually dismissed, he served over five years in prison. Today Poulsen is an investigative journalist and editor for Wired News and SecurityFocus.

Law Enforcement Challenges

Local law enforcement agencies were the primary government bodies that investigated cybercrimes prior to the advent of the internet, but once the internet became widespread, cybercrimes took on an international character and forced cooperation between law enforcement agencies scattered around the world (Schjolberg, 2008, p. 2-6). This in turn revealed the various impediments facing law enforcement agencies investigating cyber crime, including inconsistent penal codes in different nations. The international principle of dual criminality, which states that an act must be criminal in both countries before extradition proceedings can begin, impeded initial attempts to investigate and prosecute cybercriminals (Kabay, 2008, p. 35). Such legal deficiencies have been gradually addressed through a large number of national and international efforts spanning over 30 years and has resulted in the establishment of national and international law enforcement 'expert' task forces to address the challenges faced when investigating cybercrime and prosecuting cybercriminals (Schjolberg, 2008, p. 2-6).

The Constantly Changing Virtual Landscape

In the United States, the magnitude of the threat motivated President Obama to declare the appointment of a CyberCzar to help coordinate law enforcement efforts to combat cybercrime (James, 2009). The threat of espionage and cyberterrorism is also so great that the Department of Defense has or will establish a new military command focused exclusively on cyber warfare. This is in response to a series of espionage attacks that many suspect China was behind. The Stuxnet worm, which attacked industrial computer systems manufactured by Siemens, was believed to have been developed by a team of around a dozen programmers working for about…

Sources used in this document:
References

Hesseldahl, Arik. (2010, Oct. 14). How bad guys worm their way into factories. Bloomberg Businessweek. Retrieved 3 Dec. 2011 from http://www.businessweek.com/technology/content/oct2010/tc20101013_236876.htm

James, Randy. (2009, June 1). A brief history of cybercrime. New York Times. Retrieved 3 Dec. 2011 from http://www.time.com/time/nation/article/0,8599,1902073,00.html

Kabay, M.E. (2008). A Brief History of Computer Crime: An Introduction for Students. Retrieved 2 Dec. 2011 from www.mekabay.com/overviews/history.pdf

Kowalski, Melanie (2002). Cyber-Crime: Issues, data sources, and feasibility of collecting police-reported statistics. Cat. 85-558-XIE. Canadian Centre for Justice Statistics, Minister of Industry. Retrieved 3 Dec. 2011 from http://dsp-psd.pwgsc.gc.ca/Collection/Statcan/85-558-X/85-558-XIE2002001.pdf
Langton, Lynn. (2011). Identity theft reported by households, 2005-2010. Bureau of Justice Statistics, Office of Justice Programs, U.S. Department of Justice. Retrieved 3 Dec. 2011 from http://bjs.ojp.usdoj.gov/content/pub/pdf/itrh0510.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Crime Workplace Is Not Safe From Numerous
Words: 3278 Length: 11 Document Type: Essay

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Cyber Threats: Executive Summary It Is Important
Words: 1475 Length: 4 Document Type: Essay

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in

History of Prostitution "There Hasn't
Words: 4911 Length: 10 Document Type: Term Paper

MYTH: Decriminalizing prostitution would save a lot of money because police wouldn't have to arrest prostitutes or johns or pimps. FACT: Decriminalization of prostitution has resulted in expensive legal challenges because no one wants prostitution zoned into their neighborhood or near their kids' schools. Mustang Brothel was shut down because of tax evasion. Pimps are simply not going to hand over the massive profits that they make from the business of

Cyber-Citizen, USA Cyber-Citizen USA the
Words: 5130 Length: 20 Document Type: Research Paper

The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and

Cyber-Bullying Bullying May Be a Practice That
Words: 2037 Length: 8 Document Type: Research Paper

Cyber-Bullying Bullying may be a practice that has been around since the beginnings of human history, but with the increasing access that people have to technology a new medium is now used by aggressors. Cyber bullying is an act that involves using computers, cell phones and other sorts of media to consistently harass others. The object of the bullying, to cause physical or psychological damage to another, is the same, but

Cyber Bullying and Social Work
Words: 6683 Length: 20 Document Type: Research Paper

Cyber Bullying and Its Impact Over the past decade, attention has been drawn to cyber-bullying by the media and researchers. Research on cyber-bullying has covered the various behavior aspects; focusing mainly on demographic and personal factors of the involved individuals. Particularly, the research has been targeted at factors among adolescents; who account for a majority of cyber-bullying cases. Nonetheless, it is important that other populations are studied too -- even adults

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now