Free Essay

Cybercrime

In:

Submitted By I07007161
Words 3403
Pages 14
Organized Crime and Cyber-Crime: Implications for Business
Phil Williams, CERT® Coordination Center
Introduction
The capabilities and opportunities provided by the Internet have transformed many legitimate business activities, augmenting the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. Criminals have also discovered that the Internet can provide new opportunities and multiplier benefits for illicit business. The dark side of the Internet involves not only fraud and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of disruption that is the focus of the intruder community. In the virtual world, as in the real world, most criminal activities are initiated by individuals or small groups and can best be understood as “disorganized crime.” Yet there is growing evidence that organized crime groups or mafias are exploiting the new opportunities offered by the Internet. Organized crime and cyber-crime will never be synonymous – most organized crime will continue to operate in the real world rather than the cyber-world and most cyber-crime will continue to be the result of individuals rather than criminal organizations per se. Nevertheless, the degree of overlap between the two phenomena is likely to increase considerably in the next few years. This is something that needs to be recognized by business and government as an emerging and very serious threat to cyber-security. Accordingly, this analysis sets out to do three things:
1. Explain why the Internet is so attractive to criminals in general and to criminal organizations in particular.
2. Identify some clearly discernible trends that provide important clues about ways in which organized crime and cyber-crime are beginning to overlap.
3. Identify a series of measures necessary for business to respond effectively to the growing exploitation of the Internet by organized criminals.
Organized Crime and Cyber-Crime
Organized crime is primarily about the pursuit of profit and can be understood in
Clausewitzian1 terms as a continuation of business by criminal means. Criminal organizations are not the only players in illicit markets, but they are often the most important, not least because of the added “competitiveness” that is provided by the threat of organized violence. Moreover, criminal organizations tend to be exceptionally good at environmental scanning in the search for new criminal enterprises and activities. In this context, the Internet and the continuing growth of electronic commerce offer enormous new opportunities.
1

[Editor’s note: Carl Phillip Gottleib von Clausewitz (1780-1831) was a Prussian soldier and intellectual who wrote a book on military strategy entitled On War.]

1

In recent years, there has been a massive increase in the sophistication of organized crime and drug trafficking groups. Colombian drug trafficking organizations, for example, have followed standard business practices for market and product diversification. Criminal organizations have increasingly hired financial specialists to conduct their money laundering transactions. This adds an extra layer of insulation while utilizing legal and financial experts knowledgeable about the layering of financial transactions and the availability of safe havens in offshore financial jurisdictions. Similarly, organized crime does not need to develop technical expertise about the Internet; it can hire those in the intruder community who do have the expertise, ensuring through a mixture of rewards and threats that they carry out their assigned tasks effectively and efficiently.
Organized crime groups typically have a home base in nations that provide safe havens from which they conduct their transnational operations, such as various kinds of trafficking activities. In effect, this provides an added degree of protection against law enforcement and allows them to operate with minimal risk. The inherently transnational nature of the Internet fits perfectly into this model of activity and the effort to maximize profits within an acceptable degree of risk. In the virtual world there are no borders (a characteristics that makes it very attractive for criminal activity); yet when it comes to policing this virtual world borders and national jurisdictions loom large – making large-scale investigation slow and tedious at best, and impossible at worst.
The Internet itself provides opportunities for various kinds of theft. Online thieves can rob online banks or illicitly gain access to intellectual property. The Internet offers new means of committing old crimes such as fraud, and offers new vulnerabilities relating to communications and data that provide attractive targets for extortion, a crime that has always been a staple of organized crime.
The anonymity of the Internet also makes it an ideal channel and instrument for many organized crime activities. The notion of a criminal underworld connotes a murkiness or lack of transparency, where who is doing what is usually hidden from view. Secrecy is a key part of organized crime strategy and the Internet offers excellent opportunities for its maintenance. Actions can be hidden behind a veil of anonymity that can range from the use of ubiquitous cyber-cafes to sophisticated efforts to cover Internet routing.
Organized crime has always selected particular industries as targets for infiltration and the exercise of illicit influence. In the past, these have included the New York garbage hauling and construction industries and the Fulton Fish Market, the toxic waste disposal and construction industries in Italy, and the banking sector and aluminum industry in Russia. From a n organized crime perspective, the Internet and the growth of e-commerce can be understood as the provision of a new set of targets for infiltration and the exercise of influence – a prospect that suggests that

2

Internet technology and service firms should be particularly careful about prospective partners and financial supporters.
In sum, the synergy between organized crime and the Internet is not only very natural but also one that is likely to flourish and develop even further in the future.
The Internet provides both channels and targets for crime and enables them to be exploited for considerable gain with a very low level of risk. For organized crime it is difficult to ask for more. It is critical, therefore, to identify some of the ways in which organized crime is already overlapping with cyber-crime.
Major Trends in Organized Crime and Cyber-Crime
The first trend is that organized crime groups use the Internet for major fraud and theft activities. Perhaps the most notable example of this – albeit an unsuccessful one – occurred in October 2000 and concerned the Bank of Sicily. A group of about 20 people, some of whom were connected to mafia families, working with an insider, created a digital clone of the Bank’s online component. It then planned to use this to divert about $400 million allocated by the European Union to regional projects in Sicily. The money was to be laundered through various financial institutions, including the Vatican bank and banks in Switzerland and Portugal. The scheme was foiled when one member of the group informed the authorities.
Nevertheless, it revealed very clearly that organized crime sees enormous opportunities for profit stemming from the growth of electronic banking and electronic commerce.
Indeed, organized crime diversification into various forms of cyber-crime or
Internet related crime is closely related to a second discernible trend – organized crime involvement in what was once categorized as white collar crime. The activities of the US mob and Russian criminal organizations on Wall Street fall into this category: during the late 1990s there were numerous cases of criminal organizations manipulating micro-cap stocks using classic “pump and dump” techniques. While much of this was done through coercion or control of brokerage houses, the Internet was also used to diffuse information that artificially inflated the price of the stocks. Among those involved were members of the Bonnano,
Genovese, and Colombo crime families as well as Russian immigrant members of the Bor organized crime group. As criminal organizations move away from their more traditional “strong arm” activities and increasingly focus on opportunities for white collar or financial crime, then Internet-based activities will become even more prevalent. Since Internet-related stock fraud results in $10 billion per year loss to investors, it offers a particularly lucrative area for organized crime involvement. This is not to suggest that organized crime will change its character. Its inherent willingness to use force and intimidation is well suited to the development of sophisticated cyber-extortion schemes that threaten to disrupt information and communication systems and destroy data. Indeed, the growth of cyber-extortion is

3

a third significant trend. Although extortion schemes — as the Bloomberg 2 case showed — are sometimes bungled, they can be done in ways that incur only modest risks (because of anonymity) and yield high pay-offs. Indeed, this might already be a form of crime that is significantly under-reported. Yet it is also one that we can expect to see expand considerably as organized crime moves enthusiastically to exploit the new vulnerabilities that come with increased reliance on networked systems.
A fourth trend is the use of what were initially nuisance tools for more overtly criminal activities. Perhaps the most notable example of this occurred in Fall 2000 when a variation of the Love Letter worm was used in an effort to gain access to account passwords in the Union Bank of Switzerla nd and at least two banks in the
United States. Although this episode received little attention – and it is not entirely clear who the perpetrators were, it gives added credence to the point made above that there is a growing relationship between organized crime and intruders who provide the technical expertise.
A fifth trend that we can expect to see is what might be termed jurisdictional arbitrage. Cyber-crimes – certainly when they are linked to organized crime – will increasingly be initiated from jurisdictions that have few if any laws directed against cyber-crime and/or little capacity to enforce laws against cyber-crime. This was one of the lessons of the Love Bug virus. Although the virus spread worldwide and cost business billions of dollars, when FBI agents succeeded in identifying the perpetrator, a student in the Philippines, they also found that there were no laws under which he could be prosecuted. Although more and more countries (including the Philippines) are passing legislation dealing with cyber-crime, there will continue to be what have been termed jurisdictional voids from which criminals and intruders can operate with impunity. Indeed, it is possible that some jurisdictions will increasingly seek to exploit a permissive attitude to attract business, creating both information safe havens (paralleling offshore tax havens and bank secrecy jurisdictions) that make it difficult for law enforcement to follow information trails and insulated cyber-business operations.
A sixth trend is that the Internet is increasingly likely to be used for money laundering. As the Internet becomes the medium through which more and more international trade takes place the opportunities for laundering money through over-invoicing and under-invoicing are likely to grow. Online auctions offer similar opportunities to move money through apparently legitimate purchases, laundering money by paying much more than the goods are worth. Online gambling also makes it possible to move money – especially to offshore financial centers in the
Caribbean. Moreover, as e-money and electronic banking become more widespread, the opportunities to conceal the movement of the proceeds of crime in an increasing pool of illegal transactions are also likely to grow.
2

[Editor’s note: Michael Bloomberg, founder of Bloomberg L.P, an information services, news, and media company, worked with the FBI in a sting operation to apprehend cyber-extortionists, who were arrested in August 2000.]

4

A seventh trend is what might be termed growing network connections between hackers or small-time criminals and organized crime. In September 1999, for example, two members of a group known as the “Phonemasters” were jailed for two years and 41 months respectively. They had penetrated the computer systems of MCI, Sprint, AT&T, and Equifax. One of them, Calvin Cantrell had downloaded thousands of Sprint calling card numbers that were sold to a
Canadian who passed them to someone in Ohio, from whom they went to an individua l in Switzerland and subsequently to organized crime groups in Italy. As well as intruders working directly for criminals, these network connections between the two kinds of groups are likely both to deepen and to widen.
In addition, of course, organized crime groups use the Internet for communications
(usually encrypted) and for any other purposes when they see it as useful and profitable. Indeed, organized crime is proving as flexible and adaptable in its exploitation of cyber-opportunities as it is many other opportunities for illegal activity. The implications are far-reaching and require a response not only from governments but also from businesses that can all too easily become the targets of organized crime and cyber-crime.
Implications for Business
The implications of all this for business are far-reaching. They suggest that there is a need for major changes in thinking about cyber-security and in planning and implementing security measures. These are particularly important if e -commerce is to reach its full potential and if individual companies are to avoid significant losses as a result of criminal activities. Perhaps the most important changes are in thinking. This has two distinct but overlapping dimensions: security has to be understood in b road rather than narrow terms, and security can no longer be an after-thought, but needs to be part of intelligence, planning, and business strategy.
With this in mind, there are several specific recommendations that need to be considered carefully by firms in the high-tech sector.
1. Recognize the real problem is crime, not hacking
Organized crime and cyber-crime are becoming an increasingly salient component of the business environment. Disruption, denial of service, and web site defacements will continue to be problems, but exploitation of access to information systems for profit is likely to become more pervasive. The trend towards accessing business systems, highlighting security holes, and offering one’s services for a significant fee, for example, is a thinly veiled form of extortion. As such, it is very difficult from traditional hacking that is designed to highlight security problems and ways of dealing with them as simply a demonstration of expertise.
2. Business intelligence needs to include criminal intelligence analysis
Indeed, criminal intelligence analysis needs to be integrated fully into business intelligence; risk assessment needs to incorporate criminal threats; and cybersecurity needs to be conceptualized as part of a broader security problem that

5

cannot be understood or dealt with in strictly technical terms. Defending against such contingencies requires that high-tech firms develop broad security programs that incorporate cyber-security into a much broader program. Cyber-security needs to be one component of a broader security program that includes personnel, physical assets, the provision of services, and financial assets. An arrangement in which the security officer is responsible for cyber-security as part of a comprehensive mandate is likely to be more effective and appropriate than one in which cyber-security is seen as a distinct portfolio separate from other components of security.
3. Beware of infiltration
If cyber-extortion is likely to be a growing problem, another danger is that the hightech industry is vulnerable to infiltration by organized crime, especially when seeking foreign partners. Consequently, the kind of due diligence exercise that has long been common in the banking sector needs to be extended to other industries.
For bankers “know your customer” has become standard practice. For the hi-tech business, it is perhaps even more important to know your partners, especially when they are from another country. Questions need to be asked about their financing, their clients, and their associates – as well as the extent to which there are laws against cyber-crimes. Thorough background checks are essential prior to allowing any joint use of data and communication systems, or to bringing in their representatives to work with one’s own employees. When there is overseas expansion, these background checks need to be extended to new employees and consultants. Although this might appear to be an exaggerated concern, it is not.
One characteristic of Russian organized crime, in particular, is the systematic way in which it has infiltrated and, in some cases, come to dominate particular economic sectors, often operating through apparently legitimate front companies.
Organized crime has infiltrated large parts of the Russian banking system, dominates the energy sectors in St. Petersburg, and has made great inroads into the hotel system. There is no reason that the high-tech sector should be exempt.
Indeed, Mikhail Cherny, a well-known Russian entrepreneur with a very dubious reputation, was expelled from Bulgaria in the summer of 2000. He had a controlling interest in Mobiltel, the largest provider of cellular telephones in the country, and had been engaged in several fraudulent activities as well as suspected money laundering. Although the dangers are greater when companies operate in other countries, even in the United States there are problems with organized crime. Russian criminals in the United States, for example, operate through émigré networks, and there is a growing Russian presence in the information technology sector that could very easily be connected in some ways to
Russian organized crime.
4. Be sensitive to money laundering opportunities
Companies offering financial services on the Internet – and particularly those offering mechanisms to facilitate financial transactions – need to take steps to identify opportunities for money laundering. Once this is done, they need to introduce safeguards to close loopholes and prevent money laundering. The more

6

this is done by the firms themselves, the less likely they are to be embarrassed and the less likely they will be subject to government regulation.

5. Develop partnerships and information-sharing arrangements
Another response to the growing overlap between organized crime and cybercrime is to develop a working partnership with government and law enforcement agencies. Once again, there are precedents for this in other sectors. In recent years, the major oil companies, although very competitive with one another, established information sharing arrangements and worked very closely with law enforcement to minimize infiltration by organized crime figures and criminal companies. Government-private sector cooperation of this kind is not always easy, and has been particularly fraught in the area of information security, particularly regarding the issue of reporting. There is broad agreement that cyber-crime is under-reported. One of the most important – and understandable – reasons is concern on the part of financial institutions and businesses about reputational damage. For e-commerce to continue to expand rapidly, transactions must be perceived to be secure – and there is a natural desire to avoid any disclosures that might undermine customer confidence and place a company at a competitive disadvantage. Unfortunately, this reticence works in favor of the criminals. There are three levels at which the disclosure issue can be understood: within the business sector itself, the relationship between business and law enforcement, and full public disclosure. Indeed, the more the first two options are developed and refined, the less need there will be for full public disclosure. One useful approach, therefore, would be for companies within a particular sector to agree to share information about cyber-crimes among themselves, on the assumption that similar methods and techniques that are used against one are also likely to be used against others. Even more important though is the development of mutual trust between business and law enforcement. Indeed, there are several instances of companies working closely with law enforcement in responding to cyber-threats.
Perhaps the classic example is the failed effort to extort Bloomberg. The head of the company worked closely with the FBI and participated in a sting operation that led to the arrest of the extortionists. For cooperation to be effective, however, law enforcement agencies have to exercise considerable care and discretion not to expose company vulnerabilities, while the companies themselves have to be willing to report any criminal activities directed against their information and communication systems.
None of these measures is a panacea. Nevertheless, each one can be understood as a key element of what needs to be a comprehensive response. Individual firms obviously have to tailor their security programs to their particular vulnerabilities and needs. Unless they recognize that organized crime and cyber-crime are becoming more convergent, however, their programs are unlikely to be sufficient.
“CERT” and “CERT Coordination Center” are registered in the U.S. Patent and Trademark Office.
Copyright 2002 Carnegie Mellon University

7

Similar Documents

Premium Essay

Cybercrime

...Cybercrime There are approximately 40 federal statutes that govern the prosecution of computer-related crimes. Some of the most prominent are the Copyright Act, the National Stolen Property Act, mail and wire fraud statutes, the Electronic Communications Piracy Act, the Communications Decency Act of 1996, the Child Pornography Prevention Act, and the Child Pornography Prevention Act of 1996. Congress recognized computer related computer-related crimes as discrete federal offense with the passage of the counterfeit access device and computer fraud and abuse law in 1984. So as you can see there are quite a few different statutes that apply to computer crime. As for local and state statutes that involve cybercrime there is not too many. In Michigan the terms of cybercrime are these. Mental state must be intentional, misdemeanor if violation involves $200 or less, felony if violation involves more than $1000, attempt is not considered a crime, and civil lawsuits are not permitted. Federal, state, and local statutes apply to the phenomenon of cybercrime by more and more cybercrimes happening and being taken into court proceedings. For example there was a case recently where the US government charged 8 people in a cyber-crime scene that netted close to $45 million dollars in just a few hours. Many of these crimes do not have clearly drawn lines on what charges will be applied to what crime so statutes must be followed to decide the severity of the crime and the punishment....

Words: 255 - Pages: 2

Free Essay

Cybercrime

...Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? At the rate technology is evolving, and all the monetary transactions going on, it can create an attraction for thieves. Major types of cybercrime can be anything from illegal betting, to identity theft, or more serious crimes such as human trafficking and child pornography. “to find violators and also propose new legislation to protect law-abiding citizens from cyber-crimes.” There are something we can do to protect ourselves from cybercrime like having anti-spyware, virus protection and malware software, but even with all of that we still might need some help. The government has tried to step up, and protect us but their efforts don’t always lead to a physical person to be punished for their crimes. Cyber bullying is a serious issue in today’s schools and business. If everyone adopted and educated people on netiquette guidelines would this issue be solved? Explain. It may help in a small way, but it will not eliminate the problem, because although we might not like to admit it we tend to be bullies on and off line. If we educate our kids and ourselves on how to behave and treat people well, that might have an impact on other people that are victims of cyber-bullying. It is a serious subject, there has been rumors that teenage kids have committed suicide, as a result from being bullied. “There also have been...

Words: 509 - Pages: 3

Premium Essay

Cybercrime

...Cybercrime Gabriela Peralta and James Walton CJA/204 April 5th, 2015 Robert Quesada Cybercrime The dark side of new technologies, as far as the justice system is concerned, is the potential they create for committing old crimes in new ways or for committing new crimes never before imagined; one of these ways is Cybercrime. Cybercrime is act of crime when using a computer and the Internet. Cybercrime, or computer crime, focuses on the information stored in electronic media, which is why it is sometimes referred to as information technology crime or info crime. This can be anything from downloading illegal music file to stealing money from online bank accounts. Cybercrime can also include non-monetary offenses, such as creating and distributing viruses on other computers or posting business information on the Internet that is meant to be confidential. There is no boundaries or jurisdictions when it comes to cybercrime ŞTEFAN, I. (2011). Below is three known cybercrimes though there are many more cybercrimes in the past and the future these are just a few. This cybercrime is considered being the biggest attack in US history. Five hackers hacked into companies like NASDAQ, Visa Inc., J.C. Penny Co, Jet blue airways Co, and Carrefour SA. They caused over 300 million to these companies. The hackers primarily wanted to steal and sale the 160 credit card numbers they stole from the companies. Authorities say each man had their own role, two hacked networks, another mined...

Words: 1242 - Pages: 5

Premium Essay

Cybercrime

...Cybercrime: The Real Deal Reginald McInnis SEC 402 Information Warfare and Homeland Security Strayer University Spring 2012 Instructor: Professor Scott McCrea In our society there are many different way of communication around the world. With the rapid usage of the Internet and the access of personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi...

Words: 2360 - Pages: 10

Premium Essay

Cybercrimes

...characteristics like being easiest and also quickest way of committing it. In a simple way it can either be defined as a combination of crime and computer. Or any offence or crime in which involved are computers and networks. Origins of Cybercrime combine the term crime with the root cyber from the word cybernetic, from the Greek, kubernân, which means to lead or govern. The cyber environment includes all forms of digital activities, regardless of whether they are conducted through networks and without borders. This extends the previous term computer crime to encompass crimes committed using the Internet, all digital crimes, and crimes involving telecommunications networks. For example, cybercrimes can range from being fraud to unrequested emails (spam). They can also steal both government and corporate secrets by hijacking through official sites. These crimes also involve in stealing huge amounts of money from online bank accounts. Cybercrimes can also indulge in non-money offenses like creating viruses on others computers or posting some confidential information on the internet. (Which at once affected entire world except India as our people doesn’t possess any protection to our computers). In altogether, these cybercrimes can never amount to a single category. As we have them committing in various ways and places. Unlike other countries, cyber Crime is not defined in Information Technology Act 2000 or in the I.T. Amendment Act 2008 or in any other legislation...

Words: 526 - Pages: 3

Free Essay

Cybercrime

...Nowadays, E-commerce is a fundamental part of marketing activity. Most of e-commerce proceeds on the websites of publicly traded companies. A challenge that e-business face is that vulnerably experience e-crime, also known as cybercrime. As Internet technology continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Various types of Cyber crimes that can be encountered over the net are spam, fraud, cyber terrorism and so on. Whether for individuals, companies or governments, cybercrime has become a big problem. Spam is defined as unsolicited junk e-mail. It is used by chain mailers, forger and some others who selling dubious products.  “The Federal Trade Commission (FTC) has identified 12 types of scams that are most likely to arrive in consumers’ e-mail boxes. The “dirty dozen” are: business opportunities, bulk e-mail, work at home schemes, health and diet scams, effortless income, free goods, investment opportunities, cable descrambler kits, guaranteed loans or credit on easy terms, credit repair, and vacation prize promotions”(Phommalinh). Meanwhile, the most common type of cybercrimes occurred in spam is virus which spread by e-mails. When one receive an e-mail with a virus, the default settings of your computer do not have any action required to resist virus. At that point, virus can follow instructions and does anything whatever...

Words: 1173 - Pages: 5

Premium Essay

Cybercrime

...years has led to the increase in new form of crime – cybercrime – throughout the world. Cybercrimes are responsible for the interruption of normal computer functions and have been known to cause the downfall of many companies. This research paper aims to discuss following aspects of cybercrimes: the definition, who they affect and some cybercrime prevention procedures. Broadly speaking, this report will display all necessary information helping people avoid being victims of cybercrimes. Table of contents ABSTRACT 1. Introduction 2. Discussion of findings 2.1. What are cybercrimes? 2.2. What are the effects of cybercrimes? 2.3.1. Potential economic impact 2.3.2. Impact on consumer trust 2.3.3. Impact on national security 2.3. How to prevent cybercrimes? 2. Conclusion REFERENCES 1. Introduction In our modern technology-driven age, keeping our personal information private is becoming more and more difficult. The truth is, highly classified details are becoming more available to public databases because we are more interconnected than ever. This creates a negative stigma that the use of technology is dangerous because practically anyone can access one’s private information for a price. Technology continues to promise to ease our daily lives, however, there are dangers of using technology. One of the main dangers of using technology is cybercrimes. Cybercrimes are any crimes that cause harm to another individuals...

Words: 1762 - Pages: 8

Free Essay

Cybercrime

...Cybercrime With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world. Differences between Cybercrime and Traditional Crime For an individual to fully understand the difference between cybercrime and traditional crime, the individual needs to understand what cybercrime is. The definition of cybercrime is according to "Oxford Dictionaries" (2014), "crime conducted via the internet or some other computer network" (cybercrime). Cybercrime is committed by hackers with the goal of financial gain in min by stealing personal information(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are many different categories for cybercrime but the main four include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are charged on a state law level; however, there are plenty of federal laws that can be violated through committing cybercrime. The main difference that needs to be known is that when cybercrimes are committed, the...

Words: 1128 - Pages: 5

Free Essay

Cybercrime

...They have helped increase productivity and made our lives so much easier. Due to the ease computers have made, it has also opened a door for a new breed of criminal. Cybercrime is on the rise. Cybercriminals use the Internet to spread their viruses, worms, and other hacking tools, like phishing, to steal people’s identity or sign them up for expensive services, which they reap the profits. However, some of these criminals do it for thrill of the chase. According the reading CompCriminal.doc there are two types of cybercriminals, the non-professional hacker and the professional hacker. Another form a cyber-attack called the DoS attack or denial-of-service. “The attack is designed to paralyze websites, financial networks and other computer systems by flooding them with data from outside computers.” (James, 2009). The first document case of a DoS attack was in 2000 by a 15-year old Canadian boy nicknamed “Mafiaboy”. This attack was against several e-commerce sites including eBay.com and Amazon.com. There have been several other hackers prior to “Mafiaboy”. Two of the notorious cybercriminals were Kevin Mitnick and Robert Morris. In 1982, Mitnick broke into the North American Air Defense Command’s computer system. Mitnick was arrested, and convicted for his cybercrimes 1989, which was the first time he was convicted. In 1988, Morris created an Internet worm, which halted almost all Internet activity. He claimed it was an experiment, which...

Words: 1009 - Pages: 5

Premium Essay

Cybercrime

...Case Study – Cybercrime International Centre for Criminal Law Reform and Criminal Justice Policy 1822 East Mall, Vancouver British Columbia, Canada V6T 1Z1 Tel: 1 (604) 822-9875 Fax: 1 (604) 822-9317 Email: icclr@law.ubc.ca www.icclr.law.ubc.ca Case Study – Cybercrime By Annemieke Holthuis Counsel Criminal Law Policy Section Department of Justice Canada Case Study prepared for Co-Teaching at the National Prosecutors College Beijing China November-December 2006 As part of the International Centre for Criminal Law Reform and Criminal Justice Policy (ICCLR) and GeoSpatial SALASAN Programme: The Canada China Procuratorate Reform Cooperation Project, supported by the Canadian International Development Agency 2 Case Study - Cybercrime Public concern about the incidence of child pornography on the Internet is increasing in British Columbia. The police decide to crack down and seek the help of members of the public and Internet Service providers like XYZ Corporation. Brian, a concerned citizen and the divorced father of a young girl, contacts police expressing concerns about his roommate Dwayne. Dwayne is always on the computer and he has no idea what Dwayne is doing. Dwayne’s door is always locked and Dwayne won’t let Brian borrow the computer, even to send a quick e-mail. Lately, Dwayne acts more strangely than ever. Brian said that he didn’t know what it is but he’s no longer comfortable bringing his daughter home when Dwayne was there. Brian mentions...

Words: 7138 - Pages: 29

Premium Essay

Cybercrime

...Abstract Cybercrime is a crime committed on the Internet using the computer as a tool and in some cases a targeted victim. The term “cyber” is a misdemeanor and is not defined (Dashora, 2011). Cybercrime is similar to conventional crime both include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering...

Words: 340 - Pages: 2

Premium Essay

Cybercrime

...Cyber Crime has become a top priority for law enforcement on a local, state and federal level. We are becoming increasingly concerned about cyber threats, most particularly on computer intrusions and network attacks. Computer intrusions are becoming more commonplace, more dangerous and more sophisticated. Our nation’s critical infrastructure and our military’s command and control networks are most certainly being targeted by our enemies and other potential adversaries alike. Our companies are being targeted for insider information and our colleges and universities for their valuable research and development. All of that being said, cyber crime is hitting us at home as we are being targeted for fraud and identity theft and our children are often targeted by online predators. No one is immune to these cyber risks, individuals, countries, Fortune 500 companies and the neighborhood “Mom and Pop” store. These threats are evolving and expanding every day. It is important to be wary and safeguard information and cyber access by these fraudsters and predators. I am using the law enforcement perspective, one I am most familiar with, in this paper. Computer intrusions and network attacks can affect many different facets of national security and organizational information. It is clear that terrorists and their organizations are using the internet to recruit and maintain their strength. For example, in the Arabian Peninsula, Al Qaeda has produced a full-color, English language...

Words: 873 - Pages: 4

Premium Essay

Cybercrime

...Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨hme 3 o Richard Clayton 4 Michel J.G. van Eeten 5 Michael Levi 6 Tyler Moore 7 Stefan Savage 8 Abstract In this paper we present what we believe to be the first systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs – both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now ‘cyber’ because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/Euros/dollars a year; transitional frauds cost a few pounds/Euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be...

Words: 16972 - Pages: 68

Free Essay

Cybercrime

...Since the early 1990s, the internet has grown technologically faster and with more capabilities than any other type of technology in the world, leaving the United State with a sense of fear with this type of network being a risk to our national security. While most of us find the internet to be a great tool of information, and unlimited capabilities, it can devastate us personally and financially. The internet can increase the risk of theft, fraud and even the possibility to suffer from a cyber-attack or even worse a cyber-terrorism, leaving our country at risk especially for those who work in the government defense agencies and private corporations. In 2003, the conflict with Iraq created a round of speculations that the United States was going to experience cyber-attacks in revenge (Clarke). But, since 1995 there haven’t been any reports of cyber-attacks that would produce panic or damage to U.S. infrastructure or that affects our military operations. By any means this is not a result of idleness by terrorist groups. Between 1996 and the end of 2001 there was 1,813 international terrorist attacks performed. To mention a few that involved citizen targets, there is the Khobar Tower Bombing in June 1996, the Embassy Bombing in East Africa in August 1998, and the USS Cole attack in October 2000. Between 1996 and 2003, to compare between terrorist attacks around 1,813, computer security incidents around 217,394 and cyber-attacks on infrastructure which they were 0, reporters have...

Words: 2224 - Pages: 9

Free Essay

Cybercrime

...Baggili & Rogers - Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 550–565 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity Ibrahim Baggili 1 Zayed University, United Arab Emirates (UAE) Marcus Rogers 2 Purdue University, West Lafayette, USA Abstract A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants...

Words: 6388 - Pages: 26