Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

In:

Submitted By loveallart
Words 2411
Pages 10
History of Digital Crimes and Digital Terrorism and Their Common Current Forms
Stephanie Fisk
Strayer Universality
CIS 170
Professor CIANCIOTTA
Dec. 12th, 2013

Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
History
Public interest in cyber terrorism began in the late 1980s. As 2000 approached, the fear and uncertainty about the millennium bug heightened an interest in potential cyber terrorist attacks also increased. Although the millennium bug was by no means a terrorist attack or plot against the world or the United States, it did act as a catalyst in sparking the fears of a possibly large-scale devastating cyber-attack. Commentators noted that many of the facts of such incidents seemed to change, often with exaggerated media reports. The high profile terrorist attacks in the United States on September 11, 2001 and the ensuing War on Terror by the US led to further media coverage of the potential threats of cyber terrorism in the years following. Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy. A common thread throughout what critics perceive as cyber terror-hype is that of non-falsifiability; that is, when the predicted disasters fail to occur, it only goes to show how lucky we have been so far, rather than impugning the theory. Cybercrime in the United States is estimated to cost $100 billion annually.
Common Types
Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories; crimes that target computers directly; and crimes facilitated by computer networks or devices that are primary the target, which is independent of the computer network or device. Crimes that primarily target computer networks or devices include; computer viruses, Denial-of-service attacks, and Malware also known as malicious code. Crimes that use computer networks or devices to advance other ends include; cyber stalking, fraud and identity theft, information warfare, phishing scams, and spam.
Spam
The unsolicited sending of bulk email for commercial purposes is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.
Fraud
Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something that causes loss. In this context, the fraud will result in obtaining a benefit by altering in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes. Altering, destroying, suppressing, or stealing output is usually to conceal unauthorized transactions and this is difficult to detect. Altering or deleting stored data. Finally altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes. Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. A variety of internet scams target direct to consumers.
Obscene or offensive content
The content of websites and other electronic communications may be distasteful, obscene, or offensive for a variety of reasons. In some instances, these communications may be illegal. Over 25 jurisdictions within the USA place limits on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or inflammatory material that tends to incite hate crimes. The extent to which these communications are unlawful varies greatly between countries, and even within nations. The courts can become involved in arbitrating between groups with strong beliefs in a sensitive area. One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.
Harassment
Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Any comment that may be found derogatory or offensive is considered harassment. There are instances where committing a crime, which involves the use of a computer, can lead to an enhanced sentence. For example, in the case of United States v. Neil Scott Kramer, Kramer was served an enhanced sentence according to the U.S. Sentencing Guidelines Manual for his use of a cell phone to “persuade, induce, entice, coerce, or facilitate the travel of, the minor to engage in prohibited sexual conduct.” Kramer argued that this claim was insufficient because his charge included persuading through a computer device and his cellular phone technically is not a computer. Although Kramer tried to argue this point, U.S. Sentencing Guidelines Manual states that the term computer "means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device." Connecticut was the first state to pass a statute making it a criminal offense to harass someone by computer. Michigan, Arizona, and Virginia have also passed laws banning harassment by electronic means. Harassment as defined in the U.S. computer statutes is typically distinct from cyberbullying, in that the former usually relates to a person's "use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act," while the latter need not involve anything of a sexual nature. Often it is confusing wondering why harassment occurs over the internet. The fact of the matter is that bullying over the internet may occur for no reason. These crimes are considered a computer harassment crime of convenience.
Threats
Although law in most democratic societies protects freedom of speech, it does not include all types of speech. In fact, spoken or written speech/text is criminalized because of intent to harm or intimidate, that also applies for online, or any type of network related threats in written text or speech. The US Supreme Court definition of "true threat" is statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group.
Drug trafficking
Drug traffickers are increasingly taking advantage of the internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.
Cyber terrorism
Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. However, there is a growing concern among federal officials that such intrusions are part of, an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them. Cyber terrorism in general, can be defined as an act of terrorism committed with cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. As well, there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, and blackmailing. Cyber extortion is a form of cyber terrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks. According to the Federal Bureau of Investigation, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack.
Cyber warfare
Sailors analyze, detect, and defensively respond to unauthorized activity within U.S. Navy information systems and computer networks. The U.S. Department of Defense (DOD) notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia. Fearing that such attacks may become the norm in future warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by warfighting military commanders in the future.
References
Baranetsky, Victoria (November 2009). What is cyber terrorism? Even experts can't agree.
Harvard Law Record.
Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws,
Rights, and Regulations. Hershey, PA, USA: IGI Global
Jaishankar, K. (2008). Space Transition Theory of cyber crimes. In Schmallager, F., & Pittaro,
M. (Eds.), Crimes of the Internet. (pp.283-301) Upper Saddle River, NJ: Prentice Hall
Kruse, Warren G.,& Heiser, Jay G. (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392.
Latest viruses could mean ‘end of world as we know it,’ says man who discovered Flame, The Times of Israel, June 6, 2012
Mann, David, & Sutton, Mike (2011-11-06). "Net crime". Bjc.oxfordjournals.org. Retrieved 2013-12-10.
Matusitz, Jonathan (April 2005). "Cyber terrorism:". American Foreign Policy Interests 2: 137– 147.
Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.
Parker D (1983) Fighting Computer Crime, U.S.: Charles Scribner’s Sons.
Taylor, Robert W., Fritsch, Eric J., Liederbach, John & Holt, Thomas J. (2011, 2006). Digital
Crime and Digital Terrorism, Second Edition, Upper Saddle River: Pearson Education, Inc.
Taylor, R., Caeti, T., Loper, K., Fritsch, E., & Liederbach, J. (2006). Digital crime and digital terrorism: Chapter 3 - The Criminology of Computer Crime. Pearson/Prentice Hall

Willison, R. (2006a). Understanding the offender/environment dynamic for computer crimes.
Information Technology & People. Vol 19. Issue 2. , (pp.170–186).

Week 10 Term Paper Submission .
If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser." Click the link above to submit your assignment.

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Due Week 10 and worth 250 points You have been asked to participate in a presentation on digital crime and terrorism for local and national law enforcement agencies. The presentation is to be geared toward law enforcement personnel who are beginning their career protecting the U.S. from digital crimes. Possible topics to choose from include: the history of digital crimes and digital terrorism; common current forms of these crimes; common hacker / terrorist profiles; investigations and digital forensics; key legislation and laws pertaining to law enforcement; law enforcement roles and responses on these crimes (including federal, state, and local roles); and the future of digital crimes and digital terrorism.

Write a 6-8 page paper in which you:
1.Explain why the topic is relevant in the context of digital crime and digital terrorism.
2.Describe how the issue has evolved or been altered over its lifespan.
3.Identify the cause theories associated with the topic.
4.Describe strategies for reducing or eliminating the types of crime associated with the topic.
5.Use at least five (5) quality references for this assignment. Your assignment must:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
•Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
The specific course learning outcomes associated with this assignment are:
•Explain digital crime and digital terrorism activities.
•Describe law enforcement roles and responses.
•Describe the criminology of computer crime.
•Analyze the types of digital criminals and hackers.
•Explain the various digital laws and legislation in support of law enforcement.
•Describe law enforcement roles and responses.
•Explain the procedures in the investigation of computer-related crime.
•Describe the technologies and processes involved in digital forensics.
•Describe future trends in digital crime and terrorism.
•Use technology and information resources to research issues in information technology in criminal justice.

Similar Documents

Premium Essay

Cyber Forensics

...International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes...

Words: 5129 - Pages: 21

Premium Essay

Cyber Security and Its Challenges to Society

...and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years. The act of protecting internet, computer systems and their contents...

Words: 3707 - Pages: 15

Free Essay

Business Forecasting

...be covered. II. Background c. Geographical location, including talking about recent events that have occurred and have affected the Japanese market. d. The current situation in Japan, after the natural disasters and how it has affected the business world. III. Japan v United States – Cultural Differences e. Comparative study of the Japanese culture vs the U.S. culture, and its impact on the business world. f. Importance of individuals to understand the cultures, customs and traditions of the region in order to function properly. IV. Strengths and Weaknesses g. Strengths of having a business in this region. h. Possible threats in this region i. Cyber-terror threats and the advancement in technology’s affect on security. V. Reducing the risk j. Ways to reduce the regional risk. k. Possibility of unionization, and labor protection VI. Conclusion VII. Bibliography Business Forecasting for Coastal Regions: Post-Tsunami I. Introduction In early March of 2011, thousands of individuals were killed by a 9.0 magnitude earthquake and subsequent tsunami in many coastal regions, but mainly Japan. Coastal regions are unique when it comes to business in the fact that not only do they have many dangers in the way of cyber-terrorism, corporate theft, and local tradition but they also have many environmental dangers that other parts of the world are not in danger of. Despite the dangers of opening a corporation...

Words: 3697 - Pages: 15

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Information Security Policy in Malaysia.

...Introduction Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Should confidential information about a businesses customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information...

Words: 6195 - Pages: 25

Premium Essay

Computer Crime Journal

...system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark is a milestone achievement, the limited number of IPv4 addresses creates some cause for concern. Technical Terms IP address - Internet Prototcol address is the address of a device in a TCP/IP network. IP addressing follows two versions, currently: Ipv4 and IPv6. Addresses in version four use a 32 bit (four octets of 8 bits each) address space and appear in the form ###.###.###.### (where...

Words: 7665 - Pages: 31

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Free Essay

Cyber Crime in Bangladesh

...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...

Words: 14728 - Pages: 59

Free Essay

Cis 500

...Law Enforcement Technology Needs Assessment Law Enforcement Technology Needs Assessment: Future Technologies to Address the Operational Needs of Law Enforcement In partnership with the Lockheed Martin Corporation By Christopher S. Koper, Bruce G. Taylor, and Bruce E. Kubu With contributions by Eugene Glover, John Anderson, Paul Snabel, Chuck Wexler, Rachael Bambery, Nathan Ballard, Anthony Bellero, David Prothero, Willie Marsh, Mike Schroeder, Mike Taylor, Greg Maultsby, Donnie Gilley and Dave Kier Police Executive Research Forum 1120 Connecticut Ave., N.W., Suite 930 Washington, D.C. 20036 Jan 16, 2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen...

Words: 37391 - Pages: 150

Premium Essay

Cyber Crime

...4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study examines 10 case studies of publicly traded companies affected by cybercrime, and its impact on marketing activity and shareholder value. The study also describes some...

Words: 6032 - Pages: 25

Free Essay

Russian Patriotic Hacking

...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...

Words: 8586 - Pages: 35

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Premium Essay

Information Technology

...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...

Words: 25389 - Pages: 102

Premium Essay

Forensic Evidence in It

...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094 between...

Words: 22743 - Pages: 91