Thru The Eyes Of A Summers

Not Just Another Good Looking White Kid From Texas

Crime of the Cyber Variety

I’m here to talk about two concepts of crime involving computers (computer crime and net crime). Cyber/Computer Crime  is a crime that includes a computer and a network, which could range from harassment to terrorism to drug trafficking. Netcrime refers to criminal exploitation of the internet.

 

Harassment 

Harassment can range from threatening somebody online, posting mean or embarrassing pictures or comments, stalking on social media or email. Anything regarding gender, race, religion, nationality, sexual orientation that may be found derogatory or offensive is considered harassment. Cyberbullying is often the most common form of harassment. It’s a growing problem in today’s society because it is so easy to be untraceable online.

Drug Trafficking 

Now more than ever drug dealers are starting to turn to the internet for their illegal business. Dealer are using internet technologies like encrypted emails to set up meeting times and work out delivery and distribution. They are also using postal service sites (UPS /USPS) to track shipments of all kinds of narcotics. This past April the DEA busted a “Farmer’s Market” website that was a front for a international online drug trafficking organization that was connected to over 30 countries.

Fraud

The dictionary definition of computer fraud is any type of  dishonest misrepresentation of facts that are intended to let another to do or refrain from doing something which causes loss. Their are countless types of internet scams that are targeting at taking advantage of unsuspecting people. Through the years fraud has grown in popularity in the hacking world and has grown quite sophistication too.

Forms of fraud include:

  • Editing/Altering or Destroying Data
  • Concealing unauthorized transactions on another person’s account
  • Bank fraud, identify theft, and extortion are common as well
  • Altering or writing code for fraudulent purposes

Man Charged with Fraud

Cyber Terrorism

Cyber terrorism is still a controversial term but it is the use of the Internet for any act of terrorism ranging from mass spreading of compeer viruses to planning the new 9/11.  Cyberterrorism is defined by the Technolytics Institute as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” Any kind of intentional use of computers or networks to wrong or harm anyone or anything can be considered online terrorism. I’d imagine that is one of our government biggest fears is the threat of online terrorism.

Cyber Warfare

Cyber warfare is politically motivated hacking to conduct sabotage and espionage. There are a few different methods of attack. Espionage and national security breaches being a common one. Sabotage and electrical grid power are also hotspots for hackers looking to cause trouble. The federal government even said that our power grid is susceptible to hacking. The last method is denial of-service attack, which is an attempt to make a machine or network resource unavailable to its intended users. Cyber warfare has been picking up the last few years; making this field of computer crime particularly interesting.

 

Malware

Malware is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, or in other software.It can include computer viruses, ransom ware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, and adware. Some malware is disguised as real software, and may come from an official distribution company. Devices like firewalls and anti-virsus can protect agin malware.

 

I learned a lot about computer crime working on this assignment. I learned that computer crime is a lot more common than one would think. Computers can easily be taken over by someone else. I learned that you can take steps to protect yourself from most of the cyber crime that’s out there. Firewalls and anti-virus keep my computer clean from any kinds of malware and always keep an out of for signs of hacking. I honestly can say that this crime knowledge can totally come in handy in the future.

 

References/ Citations

Fraud

Hendler, James. (2013, August 16). It’s Time to Reform the Computer Fraud and Abuse Act. Scientific American. Retrieved September 26, 2013, from http://www.scientificamerican.com/article.cfm?id=its-times-reform-computer-fraud-abuse-act

Drug Traffic

Nvorak, Kimberly. (2013, April 19). DEA Drug Smuggling Sting Nabs Online Drug Dealers. Examiner.com. Retrieved September 26, 2013, from http://www.examiner.com/article/dea-drug-smuggling-sting-nabs-online-drug-dealers

Harassment

Cyberbullying & Harassment. (n.d.). StaySafeOnline.org. Retrieved September 26, 2013, from http://www.staysafeonline.org/stay-safe-online/for-parents/cyberbullying-and-harassment

General

Computer crime – Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 26, 2013, from http://en.wikipedia.org/wiki/Computer_crime

Warfare

Cyberwarfare – Wikipedia, the free encyclopedia. (n.d.). Retrieved October 2, 2013, from http://en.wikipedia.org/wiki/Cyber_warfare

Malware

Malware – Wikipedia, the free encyclopedia. (n.d.). Retrieved October 2, 2013, from http://en.wikipedia.org/wiki/Malware

 

 



No Comments »

No comments yet.

RSS feed for comments on this post. TrackBack URI

Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

 
Skip to toolbar