Free Essay

Cyber Crime- Online Predators

In:

Submitted By AREllis1978
Words 2467
Pages 10
Running Head: Cyber Crime- Online Predators 1

Cyber Crime
A Study of Online Predators
Amber Ellis
Ivy Tech Community College

CRIM 101
David De La Cruz
December 4, 2012

Running Head: Cyber Crime- Online Predators 2
I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it.
Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against property and cybercrimes against the government. As cases of cybercrimes grow, there is a growing need to prevent them. Cyberspace belongs to everyone. Cybercrime is a menace that has to be tackled effectively not only by the official but also by the users by co-operating with the law. Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. These include attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, internet auction fraud, the penetration of online financial services, as well as the deployment of viruses, Botnets, and various email scams such as phishing.( INTERPOL 2012) The global nature of the Internet a
Running Head: Cyber Crime- Online Predators 3 allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Here are a few examples of the types of Cybercrime:
I. Financial Claims:
• This would include cheating, credit card frauds, money laundering etc.
II. Cyber Pornography:
• This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.)
III. Sale of illegal articles: • This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications.
IV. Online gambling:
• There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.
In the past, cybercrime has been committed by individuals or small groups of individuals. However, we are now seeing an emerging trend with traditional organized crime syndicates and
Running Head: Cyber Crime- Online Predators 4 criminally minded technology professionals working together and pooling their resources and expertise. This approach has been very effective for the criminals involved. In 2007 and 2008 the cost of cybercrime worldwide was estimated at approximately USD 8 billion. As for corporate cyber espionage, cyber criminals have stolen intellectual property from businesses worldwide worth up to USD 1 trillion. Even more distressing and difficult to combat is the fact that some in the media portray the computer criminal as a modern day Robin Hood. Nothing could be further from the truth. ( cybercitizenship.org) Many smaller businesses find themselves vulnerable to cyber thieves, mainly because they have limited budgets for Web security and few or no technology experts on staff. "Small businesses feel like they're immune from cybercrime, and they're wrong. They are absolutely on the list of potential targets of cybercriminals," said Larry Ponemon, chairman of the Ponemon Institute, a privacy think tank in Traverse City, Mich. The average U.S. data breach cost companies $194 per compromised record last year, he added. About 72% of the 855 data breaches world-wide analyzed last year by Verizon Communications Inc. The figures included investigations conducted by Verizon's team, as well as data-breach investigations by various law-enforcement groups around the globe, including the U.S. Secret Service and the Australian Federal Police. Courts often find banks aren't liable in cybercrime cases, in which a business client's computer systems were breached, according to George Tubin, senior security strategist for Trusteer Inc., a provider of cybercrime prevention technology in Boston. He said many cases brought by small-business owners after their business accounts have been hacked are being settled out of court. Cyber security experts say small-business owners need to do more to protect their firms from high-tech thieves than rely on standard security

Running Head: Cyber Crime- Online Predators 5 products. In conclusion, Cybercrime is a fast growing problem in today’s world of technology. We as Parents, teachers, non-profits, government, and industry have been working hard to protect kids online. However, we also need to think about protecting the Internet from kids who might abuse it. Kids might not even realize that what they are doing is illegal. Still other kids might find themselves hanging out online with skilled hackers who share hacking tools with them and encourage them to do inappropriate things online. Its annual Norton Cybercrime Report said the average UAE victim suffered direct financial losses of $283. The global study is based on self-reported experiences of more than 13,000 adults across 24 countries and calculated the direct costs associated with global consumer cybercrime at $110bn over the past 12 months. It said every second, 18 adults become a victim of cybercrime, resulting in more than 1.5m cybercrime victims each day on a global level. In the past twelve months, an estimated 556m adults across the world experienced cybercrime, more than the entire population of the European Union. The report said in the UAE, 46% of the country's internet users have fallen victim to cybercrime on social networking platforms. It added that 31% of adults have been a victim of social or mobile cybercrime in the past twelve months in the UAE compared to 21% globally. Worldwide, 15% of social network users reported someone had hacked into their profile and pretended to be them. One in 10 social network users said they'd fallen victim to a scam or fake link on social network platforms. "Cybercriminals are changing their tactics to target fast growing mobile platforms and social networks where consumers are less aware of security risks," said Marian Merritt, Norton internet safety advocate. "This year's results show that nearly half of internet users believe that unless their computer crashes or malfunctions, they're not100%

Running Head: Cyber Crime- Online Predators 6 sure they've fallen victim to such an attack." Earlier this year, the central bank of the UAE said it had fended off an onslaught from hackers trying to bring down its website. Israeli hackers were apparently behind the attack, having vowed to target various state-linked websites in Saudi Arabia and the UAE in revenge for a wave of credit card code thefts by a hacker who claimed to be operating out of Saudi Arabia. The websites of Israeli institutions have also been targeted. The Stop Online Piracy Act (otherwise known as "SOPA") would have been the most threatening act of legislation to the global Internet to date had it passed. Along with the PROTECT-IP ("PIPA") and OPEN acts, which ran through the Senate, these bills in singular and collectively would have threatened the very existence of the open Web as we know it. SOPA alone would have allowed Web sites to be shuttered, no matter where they are in the world, by blocking them at server level and starving them of oxygen. Any site even to have allegedly breached copyright could be effectively shut down by the U.S. government with little oversight or process of appeal. Google-owned YouTube, for instance, could have fallen foul of the law if someone uploaded a copyright infringing video, leading to a widespread site block. The Internet as a collective rallied around and protested in a way that had never been tested or tried before. Many major Web sites shut their doors for 12 or 24 hours during 'Black Wednesday' to protest the bill. More than 75,000 Web sites blacked out, including Wikipedia and Google. Days later, it was shelved by the U.S. House of Representatives and ultimately the geeks 'won.' However, the White House found itself on the right side of the powerful Internet community after it said it would veto any such bill should it pass along the President's desk. With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking

Running Head: Cyber Crime- Online Predators 7 themselves who is to blame for hacking attacks that drain their business accounts. In May, Lifestyle Forms & Displays Inc., a mannequin maker and importer led by the 65-year-old Mr. Keilson, had $1.2 million wiped out of its bank accounts in just hours through online transactions. The theft from the Brooklyn, N.Y., company, which has about 100 employees, wasn't an isolated incident. About a year ago, the Philippines pushed through a completely unneeded anti-counterfeiting bill at the behest of the WIPO (itself working at the behest of the US government). Despite the evidence that counterfeiting isn't a big problem, the bill was pushed through and defended with a bit of doublespeak by the Philippines IP office, who claimed that the bill had nothing to do with various corporate interests applying pressure... except for the ones that have "lost a lot of profits due to piracy." To quote Glyn Moody: "Indeed.” The Filipino government has now moved past that, enacting a so-called Cybercrime Prevention Act that goes well beyond dealing with hackers and fraudsters. As Mike pointed out earlier, the new law contained some very broad wording that outlawed "cybersex," subjecting violators to some very harsh punishments (up to six years in jail and fines up to $25,000). That, in and of itself, would be worrying. But the law goes even further, recasting former civil offenses as criminal acts. As Patrick Villavicencio at InterAksyon points out, the legislation bears a lot of resemblance to the failed SOPA/PIPA bills, aiming at taking down file sharing rather than protecting citizens from online attacks. “What SOPA and PIPA aimed to do, the Cybercrime Law has done,”) Acero said, referring to the objective of the two bills to curb the rampant sharing and downloading of movie and music content online, as lobbied by firms in Hollywood. Under Section 6 of the law, all crimes “defined and penalized by the Revised Penal Code, as amended, and special laws” can be punishable under the Act if they
Running Head: Cyber Crime- Online Predators 8 are committed with, using, and through a computer system. Rather than infringement being a civil issue or a minor crime at best, the additional wording drags this activity under the heading "cybercrime," allowing law enforcement to collect real-time traffic data on file sharers. It also contains a "takedown clause" which gives the Department of Justice "sweeping powers to issue a block or restrict order against websites." This puts the power in the hands of content producers, allowing them to have a site blocked or taken down simply by filing a request with the DOJ. One needs only look at the average legacy industry "rogue site" list to see how this provision could result in the muting of several legitimate sites. There's nothing like having previously legal activity "grandfathered in" by new laws. Not only will Filipinos need to be very careful what they say going forward, they're also going to take a long look at anything they've said in the past. Not only that, but they're going to need to be very careful with their responses to anything others say that veers towards libel. ( Cushing, Tim 2012 Those who play a part in unwittingly or willfully encouraging the spread of libelous content shall be charged for abetting libel. That means the act of clicking the "Like" button of Facebook or re-tweeting posts on Twitter may be tagged as unlawful as well. What else? "Ironic, suggestive or metaphorical language" can be considered libelous. And the penalties are incredibly harsh. Online libel can be punished with a prison term of 12 years and a ₱1,000,000 fine, far harsher than the penalties for offline libel. Between the free speech limitations and the sweeping powers being granted to content creators and law enforcement, the new law is bad news all around. The DOJ will be meeting with stakeholders in October to ensure that the IRR (implementation of rules and regulations) "will not stifle basic human rights, not the
Running Head: Cyber Crime- Online Predators 9 least of which is internet users' freedom of speech and expression." Well, we'll see how that goes. Most "stakeholder" meetings seem to be long on listening to concerns but short on actually addressing them. ( Cushing, Tim 2012)

References
What is Cyber Crime? Retrieved October 23, 2012, from cybercitizenship.org.
Cybercrime. Retrieved October 23, 2012, from http://www.interpol.int/Crime areas/Cybercrime/Cybercrime
Babu, Maya & Grahakara Parishat, Mysore (October 11, 2004). What is Cybercrime? Retrieved from http:// http://www.crime-research.org/analytics/702
Cybercriminals Sniff out Vulnerable Firms. July 5, 2012. Retrieved from http://online.wsj.com/article/
Tuluc, Ana Maria, (2012) . Economic Processes Associated With the Cybercrime Industry. Economics, Management and Financial Markets 7.2, 179-184. Retrieved September 23, 2012 from http://search.proquest.com.allstate.libproxy.ivytech.edu..
Marcum, Catherine D., Higgins, George E., Tewksbury, Richard, (2011). Doing Time for Cybercrime: An examination of the Correlates of Sentence Length in the United States. International Journal of Cyber Criminology 5.2, 825-835. Retrieved from http://search.proquest.com.allstate.libproxy.ivytech.edu.
Price, Calli, (2010). Book Review of Cybercrime: An introduction to an Emerging Phenomenon. International Journal of Cyber Criminology 4.5, 643-644. Retrieved from http://search.proquest.com.allstate.libproxy.ivytech.edu.
Sambidge, Andy. Published by & © 2012 ITP Digital Ltd.
Whittaker, Zack. Zero Day | November 16, 2012
Cushing, Tim. Thursday, Oct 4th 2012. http://www.techdirt.com/articles/20121002/18033220575/philippines-new-cybercrime-law-aims-to-protect-citizens-going-after-filesharing-online-libel.shtml

Similar Documents

Premium Essay

Online Child Exploitation

...and Preventing Online Child Exploitation Julie Swartzendruber Kaplan University Understanding and Preventing Online Child Exploitation Online child exploitation is a growing concern in the United States and abroad. Children of all age groups use the internet for socializing, school projects, entertainment, and music. The internet opens up a world of information but can unfortunately open up a world of danger for children who are particularly vulnerable to this risk. Sexual predators lurk in chat rooms and social networking sites searching for victims. After the first initial contact has been made they develop friendships by saying that they have common interests which they don’t. The internet allows the predator to anonymously hide their identity and the child thinks they are talking to someone around their own age. We need more solutions to stop child exploitation. Educating parents, children, and adults as well as legislation and policy change are one step, but more needs to be done. Strategies to combine education, training for those in the criminal justice field, resources from law enforcement, public health, and other private and public sector organizations to prevent this from happening are underway and also provide a solution to the problem. Even with the knowledge and up-to-date training, technology is always advancing making it harder for those in criminal justice to stop online child exploitation...

Words: 1694 - Pages: 7

Premium Essay

Disadvantages of Internet

...beneficial to the people. People of all age can surf the Internet regardless of their gender, age, or races. Hence, the Internet can be dangerous towards the unawared children and adults. The Internet can be dangerous because people can encounter sexual online predators and lose social interaction skills. Besides these, cyber-bullying occurs and one’s reputation may be compromised. In addition, there are cases of cyber-stalking and the Internet might lead to revolution which increases the social coordination of the public. First and foremost, the Internet has been dangerous because people may encounter sexual online predators. An online predator is one who attempts to sexually exploit a person through the use of online services and the Internet. Anyone can be an online predator. Most young teens are being targeted by the online predators. According to Richard M. Goo’s “Stranger Danger and The Online Social Network” (2008), the number of online sexual predators has been increased due to the increasing usage of the social networks. The trust and intimacy can be developed quickly online due to the anonymous of the Internet. Predators have been taking this anonymity to build online relationship with the inexperienced young people. Predators will send pornographic pictures through e-mail or Instant Messages once they have gained the young people’s trust. According to Sonia...

Words: 2012 - Pages: 9

Free Essay

The Technical Criminal

...Criminal: The Internet and Crime CIS 170- Information Technology in Criminal Justice Dr. Austen E. Ichu, PhD November 11, 2013 Generally people have a tendency to adapt to their environments and the changes occurring around them. This has also been the case with the criminal element and the way they commit crimes. Computers and their functions had taken on an entirely new level of advancement in their capabilities with the introduction of the Internet to the general public. This Internet for most can be a useful resource. From gathering research for an academic project to attending a board room meeting remotely, the Internet has proven to be key in many aspects of human life today. The Internet has also given way to a slue of new crimes and negative activity. Cyber stalking, Cyber bullying, exploitation, sex crimes, financial fraud and the use of viruses and malicious code are just a few things that have become prevalent on the information super highway. One of today’s largest concerns among parents is protecting their children from becoming victims of bullying. There was a time when you had to worry about the school bully running into while in the hallways of your school or out and about around your neighbor, but the situation surrounding bullying been given a technological advantage. Social media sites such, as Facebook.com, Twitter and Instagram have become the avenues for bullies to invade their victim’s homes and lives. In a recent cyber bullying case in Lakeland...

Words: 1001 - Pages: 5

Free Essay

Social Networking

...------------------------------------------------- Social Networking Abuse on the Internet How many of these questions can you answer before you read the text? 1) Approximately how many people use social networking sites? 2) When did online social networking begin? 3) What are some of the dangers of using social networking websites? (Try to think of as many as possible!) 4) What steps can you take to use social networking websites safely? (Again, try to think of as many as possible!) ------------------------------------------------- Social Networking Abuse on the Internet By Sue Lynn Carty Because of the vast amount, (roughly 150 million users altogether) on the two major social networks, MySpace and Facebook, the door for online social networking abuse is left wide open. ------------------------------------------------- About Social Networking Social networking actually existed before MySpace and Facebook. Online communities began building in the late 1990s with sites such as Classmates and SixDegrees. It wasn't until around 2005 when social networking exploded with MySpace, Facebook and Xanga. Although these online social communities have many positive attributes, there is one major negative attribute that all these sites have in common: social networking abuse. ------------------------------------------------- How Social Networking Abuse Occurs There is nothing...

Words: 1339 - Pages: 6

Free Essay

The Role of Internet and Crime

...Assignment 2: The Role of Internet and Crime Maria Takaki Strayer University Information Technology in Crime CIS 170 Ulysses Weakley, Ph.D May 18, 2013 Assignment 2: The Role of Internet and Crime Crime has always been an issue in this world and with the growth of technology worldwide in just the last couple of decades or so what criminals did then make it ten times easier to do now with the use of technology. The criminals do have more access but law enforcement has the same access. The internet has aided the FBI and law enforcement to help catch these criminals. There are many different types of crimes that can be committed via the internet. It can range from money laundering, to child pornography, and even stalking. There are certain states that recognize these new laws as well. “California was the first state to enact stalking legislation (in 1990), and today all 50 states and the federal government have antistalking statues (, p. 157).” The internet has helped catch child predators as well. With the use of the internet to speak with these predators online and make them think they are a child as caught many of them, as seen on such shows like “To Catch a Predator.” There has been numerous legislation set forth to take control of the internet crime. “The Computer Misuse Act (1990) is the only legislation that explicitly and solely focuses on computer crime. The act created three offences: unauthorized access to computer material; unauthorized access to a...

Words: 501 - Pages: 3

Premium Essay

Cybercrime

...Cyber Crime has become a top priority for law enforcement on a local, state and federal level. We are becoming increasingly concerned about cyber threats, most particularly on computer intrusions and network attacks. Computer intrusions are becoming more commonplace, more dangerous and more sophisticated. Our nation’s critical infrastructure and our military’s command and control networks are most certainly being targeted by our enemies and other potential adversaries alike. Our companies are being targeted for insider information and our colleges and universities for their valuable research and development. All of that being said, cyber crime is hitting us at home as we are being targeted for fraud and identity theft and our children are often targeted by online predators. No one is immune to these cyber risks, individuals, countries, Fortune 500 companies and the neighborhood “Mom and Pop” store. These threats are evolving and expanding every day. It is important to be wary and safeguard information and cyber access by these fraudsters and predators. I am using the law enforcement perspective, one I am most familiar with, in this paper. Computer intrusions and network attacks can affect many different facets of national security and organizational information. It is clear that terrorists and their organizations are using the internet to recruit and maintain their strength. For example, in the Arabian Peninsula, Al Qaeda has produced a full-color, English language...

Words: 873 - Pages: 4

Premium Essay

The Telegraph: The Role Of Hacking In Our Society

...stealing credit card numbers and pirating software and games . They also began known as "Black Hat Hackers."Hackers who protect computer security systems against "Black Hat Hackers" are known as "White Hat Hackers." According to it's online website, there are individuals who attempt to sexually exploit children through the use of online services. Some will devote money,energy, and considerable amount of time. They try and empathize with the problems of children . They will know the latest music and any other popular interests of children.They will slowly introducing sexual context and content into their...

Words: 334 - Pages: 2

Premium Essay

Cyber Pred

...Cyber Predators Sexual predators have more access to children today than in the past. Through the internet Sexual offenders can connect with children more discreetly. Today, children are just as likely to socialize online as they are to meet in the mall or by going to other public places like the movies. Predators use the anonymity of the internet to their advantage since it allows them to become whoever they want. They target both girls and boys of all ages. "Child predators are migrating from traditional methods to alternate media," says Detective Lt. Thomas Kish of the Michigan State Police. "They are going to places where children are.” (Wendy, K) Many children are not aware of these dangers. Online predators are good manipulators, they look for children that are emotionally vulnerable. They use issues the child may have to befriend and empathize with them while building a false friendship and trust. Since many naïve children list personal information online , it is easy for predators to find information about their victims. Some examples of information that should be kept private are schools attended, phone numbers, home addresses, first and last names. Children need to be guarded from online predators. Both parents and children have to be made more aware of online predators and how to avoid them. Parents can set limitations to how and when a child plays on online “the Xbox has password-protected "family settings" that allow parents to turn off Internet access or track...

Words: 1403 - Pages: 6

Free Essay

Operation Predator

...In Washington the U.S. Immigration and Customs Enforcement’s (ICE) agency have unveiled a new smartphone app called Operation Predator, this app is the first of its kind and is designed to asks the public for help in gathering information on suspected child sexual predators, including those who are fugitives. This new app created by apple in conjunction with Homeland Security Investigations’ Cyber Crime Center, lets users submit a tip by phone or by filling out a form in the app. All tips can be submitted anonymously by phone or online in the Home section. This iPhone app contains photos of fugitives and asks for help in trying to find suspected child predators for criminal prosecution. This app has an alerts section in which has images and names of people who are wanted for crimes such as possession of child pornography or child trafficking. This app also has an option that allows users to share these profiles on Twitter or Facebook to help spread the word. This app is a wonderful step in the right direction to capture pedophiles and their enablers around the world. Each year, children around the world fall prey to sexual predators and the use of this app will help Virtual Global Taskforce to protect these children from online child sexual abuse. It is very important that these kind of people be apprehended as soon as possible before they continue to destroy young lives. These perpetrators condemn their victims to a lifetime of emotional and psychological trauma and for this...

Words: 268 - Pages: 2

Free Essay

Should Internet Activity Be Monitored

...Tina Rios Business Law I Position Paper Should Internet Activity be Monitored? There has been an ongoing debate over many years on whether or not internet activity should be legally monitored by Internet Service Providers or the government. Obviously there many pros and cons to both sides of this issue. There is not only a valid need for internet monitoring of private networks in addition to government systems, but there is also a valid concern for the privacy of our country’s citizens. Both sides of this issue will be addressed as well as my own analysis of this topic. There is quite a bit of history regarding monitoring public internet communications. Some forms of electronic surveillance have been around since the Civil War. The 4th Amendment is a citizen’s primary protection against unreasonable government searches and seizures. As technologies advance the meaning of unreasonable becomes more and more unclear; meaning when private information is transmitted through wire over a long distance is it still considered private information? During the 1920’s, as phone calls were being place through switchboards, it was noticed that more and more conversations regarding illegal activities were being talked through those phone calls. It was then that police asked for clarification from the Supreme Court on whether or not wiretaps went against the 4th Amendment. It was decided that the 4th Amendment did not restrict wiretaps since there was no search not seizure. ...

Words: 2294 - Pages: 10

Premium Essay

Comm/156 Research Essay

...For 22 years, John Doe assumed the identity of a man whose wallet was stolen from his car in 1989. This form of identity theft will change over time to evolve to possibly affect any one who accesses the World Wide Web. Even though crime exists in the real world equally as it is online, The Internet is solely responsible for most of the Identity theft crimes. Crime exists in the real world equally as it is online. As much as we hate crime it is something that we have to live with. It is a constant battle that we must fight against all types of different criminal threats. Now with technology advancing so rapidly, crime has found a new home. This new home is the Internet, criminals now target individuals online in ways that is harming our society even more. The most popular committed crime in the United States would be violent crimes, rather murder, rape, assault are rated as the highest committed. The FBI states that total number of crimes reported— 10,329,135 (1,246,248 violent crimes and 9,082,887 property crimes). Most of the real horrible crimes do happen in real life but over time online has just as many threats. Online crime is tricky criminals can invade your home, your business, your office, without breaking any door or windows. They can have instant access to your social security number that they can sell on the black market. They can have access to your personal information, banking information, and...

Words: 823 - Pages: 4

Free Essay

Computer Ethics

...Computer Ethics and Cyber Crimes Computer ethics has become a vital and necessary aspect in the world today. With the growth of computer use and technology it is imperative that some standards and guidelines are set to protect the public. Today it is common that each household has multiple computers that is utilized by everyone in the household, including children. According to Wall, the term ‘cybercrime’ is widely used today to describe the crimes or harms that result from opportunities created by networked technologies. With the increase of user knowledge comes the increase potential for crimes committed with the use of technology. Cybercrimes can be committed without ever leaving the comfort of ones home and is getting harder to prevent. In this paper specific cybercrimes such as hacking, identify thief, embezzlement, and secure fraud will be analyzed. The one of the most common cybercrimes is hacking. Computer hacking is when someone gains access to another individual's or company's computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your...

Words: 1560 - Pages: 7

Free Essay

Law Enforcement Challenges

...race when a crime is committed behind a keyboard. While this challenge can pretty much be crossed off of the list, there are many more that law enforcement agencies face when investigating computer crime. There are so many laws that apply to regions of enforcement and also to the rights of the suspected criminal. The even more difficult part is that while all parties are working together to achieve the same goal, there are so many grey areas in the chain of command and jurisdictional rules. Agencies investigation crimes such as corruption face a number of different challenges as well. In my eyes, if the crime can be solved, it should not matter where the officer is from. All members of law enforcement have the same goals and that is to keep the citizens of this nation safe by preventing crime. When prevention is not possible or fails, the teams investigating should not have to worry about whether they are allowed to be doing their job. They should simply work together and document evidence and witness material accordingly. Before we tackle the jurisdiction let us point out some of the other challenges that law enforcement faces with different types of computer crime. The long list of crimes that can be carried out via the computer creates an equal list of issues that the authorities have to deal with. There is so much that goes into a crime scene and the investigation process that we take for granted. First, let’s discuss the different types of crimes that cause corresponding...

Words: 1964 - Pages: 8

Premium Essay

Cyberstalking

...CYBERSTALKING The World Wide Web and Internet are great places to study, work, or even play. But there is an ugly side of cyberspace. Cyberspace reflects the real world and some people tend to forget that cyberstalking and harassment are problems that a large number of people (especially women) are realizing. (Jenson, 1996, p.1) Cyber stalking is the use of the Internet or other electronic means to stalk someone, which may be a computer crime or harassment. This term is used interchangeably with online harassment and online abuse. A cyber stalker does not present a direct physical threat to a victim, but follows the victim's online activity to gather information and make threats or other forms of verbal intimidation (Bocjj P. and L. McFarlane, 2002). Just because an individual owns a computer and has an Internet account do not assume that person is considerate or respectful. There are just as many stalkers in cyberspace as anywhere else. It’s just that their methods have changed. Some stalkers might harass you by following you through live channels not being able to take no for an answer and bothering you with email messages. In some cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. (1996, p.3) The stalker may even trace your home address and telephone number, causing not only emotional distress but also possibly physical danger. It should come as no surprise to you that...

Words: 854 - Pages: 4

Premium Essay

Survey of Justice and Security

...businesses that are not prepared or tailored to fight. One of the fastest crimes in the United States and all over the world is cyber-crime. Cyber-crimes are the latest and most complex crimes during this age. Cyber-crime is defined as the disruption communication or electronic devices behavior as it relates to network mainframe, Internet, and telephone. Based on reports, individuals of different ages are committing cyber-crimes due to the accessibility of computers and the ease of committed the crime. The plethora of information on the internet has greatly increased the threat to national security. The 21st century internet, coupled with the social networks, has made it very easy for terrorist to communicate enabling them to commit cyber terrorism. Research conducted by the United States Institute of Peace concluded in 1998 approximately 15 terrorist organizations established websites on the internet. That numbered doubled in 2000 and more than quadrupled from 2003 to 2004. Although the research have overwhelmingly proved terrorist websites exit, those who would have an influence on regulating the websites have chosen to overlook them (Weimann, 2004). From 6 February through 14 March 2011, Norton by Symantec Corporation released a Cyber Crime Analysis Report based on an online survey of 19,636 respondents from 24 countries. The report revealed a total of over four-hundred million adults were victims of cyber-crime within a year of the study; which equated to fourteen victims per second;...

Words: 1160 - Pages: 5