StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How the Internet has aided criminal activity - Essay Example

Cite this document
Summary
Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
How the Internet has aided criminal activity
Read Text Preview

Extract of sample "How the Internet has aided criminal activity"

Running Head: CRIMINAL ACTIVITIES Criminal Activities through the Internet School How did the internet help in the execution of criminal activities?Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless. Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights. Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files.

The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records (Computer-Based Crime, 2011). This paper will give specific examples of criminal activities through the use of computers and the internet; will cite how yesterday’s non-digital crime, as in the case of pornography, has become today’s menacing digital crime; and will discuss some types of computer crimes, such as identity theft, phishing scam, virus and malicious software.

Specific Examples of Criminal Activities through the InternetSeptember 11 Attack. The execution of the September 11 attack on the World Trade Center, which claimed an estimated 3, 120 lives from over 90 countries around the world, (US Department of State, 2002), is a form of cyberterrorism. Cyberterrorism is the unauthorized attack and risk against computers, networks, and the stored information purposely executed to threaten or force a government, a nation or its people to advance one’s political or social intentions.

Cyberterrorist attacks demonstrate power and aggressively threaten or harm persons or property (Denning, 2000).Juvenile Computer Hacker Disabled FAA Tower at Regional Airport. In Boston, Massachusetts, a juvenile hacked the computer system of a telephone company servicing the Worcester Airport. A series of commands sent from the hacker’s computer immobilized the FAA control tower for six hours in March 1997 (US Department of Justice, 1998). Release of Computer Worm Attacked Microsoft Corporation.

In September 2003, a juvenile was arrested for releasing a variant of the Blaster computer worm that directly infected computers worldwide to commence a distributed denial of service attack against the Microsoft Corporation (US Department of Justice, 2003). Pornography and Pedophilia: Yesterday’s Non-Digital Crimes are now Digital Crimes More than four decades ago, open, unusual or violent pornography was restricted to adult bookstores and movie houses. It could be only be viewed and circulated in adult comic books, magazines, "peep shows," and bold films.

Pornography characters were mandatorily exposed in public, jeopardizing their identity and humiliation. The unparalleled heave of technological innovation gave us videos, pay-per-view cable television, satellite connections, compact disks, and the Internet. Such mediums provided fresh, personal and a more peculiar approach to use obscenity. Today, through the internet, pedophiles and other sex offenders, concealed behind screen names or aliases, communicate very openly and unreservedly with one another.

They meet online and exchange child pornographic images and videos, share or swap strategies to contact and entice minors online (Hughes, 2001).Computer CrimesIdentity Theft Identity theft is the pilfering and illegal use of private information from an unsuspecting individual to access personal financial accounts. The targeted personal data include a victim’s address, birth date, telephone number, social security number (SSN), bank account number, credit card number, or other valuable identification records to be used for the thief’s economic gain.

Criminals use this information in opening new credit and depository accounts, applying for home or car loans, leasing homes, apartments or vehicles (Brody, Mulig & Kimball, 2007) applying for benefits, or filing fake tax returns (Palmer, 2006). Phishing Scam Phishing is a scam that uses volumes of electronic mail messages to attract innocent victims into disclosing private information. A phishing email illustrating a believable problem lures the victim to a fake link that is a replication of the victim’s bank web address; the victim then fixes the imaginary concern and verifies account information and divulges personal identification.

Subsequently, the phisher uses the pilfered PIN number, secret code, and identity to drain the victim’s bank account (Brody, Mulig & Kimball, 2007).Viruses and Malicious Software A virus is unknowingly downloaded on a victim’s computer. This process is known as pharming which is a technically higher form of phishing. The prey keys in a genuine web address but is instead redirected to a mock site. The pharmer then steals the financial account number, password, or other valuable information supplied at the phony web site (ID thieves preying on consumers with new phishing scam called pharming, 2005).

A malware or malicious software is involuntarily installed to gain access to a computer system without the victim opening an attachment or clicking on a link. Simply opening a pharmers electronic mail or email message will directly download the secret program, forwarding the internet browser to a mock location (Hicks, 2005).ReferencesBrody, R. G., Mulig, E., & Kimball, V. (2007, September 1). Phishing, Pharming and Identity Theft. Academy of Accounting and Financial Studies Journal. Computer-Based Crime (2011).

Idea Connection. Retrieved February 18, 2012 from http://www.ideaconnection.com/solutions/505-Computer-based-crime.htmlDenning, D. (2000, May 23). Cyberterrorism. Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services, US House of Representatives. Retrieved February 19, 2012 from http://www.cs.georgetown.edu/~denning/infosec/cyberter ror.htmlHicks, D. (2005). Phishing and Pharming: Helping consumers avoid Internet fraud. Communities and Banking. Retrieved February 19, 2012 from ABI Inform database.Hughes, D. (2001).

Sexual Predators Online. Protect Kids. Retrieved February 19, 2012 from http://www.protectkids.com/dangers/onlinepred.htmID thieves preying on consumers with new phishing scam called pharming (2005, October). PRNewswire. Retrieved February 18, 2012 from http://www.nclnet.org/news/2005/phishing_10132005.htmPalmer, S. (2006, January 10). IRS warns consumers of e-mail scam. St. Petersburg Times. Retrieved February 18, 2012 from ProQuest database.U.S. Department of Justice (1998). Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport.

Federal Computer Crime Cases Involving Teens. Computer Crime & Intellectual Property Section. United States Department of Justice. Retrieved February 19, 2012 fromhttp://www.cybercrim e.gov/cases.htmU.S. Department of Justice (2003). Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft. Federal Computer Crime Cases Involving Teens. Computer Crime & Intellectual Property Section. United States Department of Justice. Retrieved February 19, 2012 fromhttp://www.

cybercrim e.gov/cases.htmU.S. Department of State (2002). September 11, 2001: Basic Facts. Retrieved February 19, 2012 from http://www.state.gov/coalition/cr/fs/12701.htm

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“How the Internet has aided criminal activity Essay”, n.d.)
How the Internet has aided criminal activity Essay. Retrieved from https://studentshare.org/miscellaneous/1589554-how-the-internet-has-aided-criminal-activity
(How the Internet Has Aided Criminal Activity Essay)
How the Internet Has Aided Criminal Activity Essay. https://studentshare.org/miscellaneous/1589554-how-the-internet-has-aided-criminal-activity.
“How the Internet Has Aided Criminal Activity Essay”, n.d. https://studentshare.org/miscellaneous/1589554-how-the-internet-has-aided-criminal-activity.
  • Cited: 0 times

CHECK THESE SAMPLES OF How the Internet has aided criminal activity

Internet and criminal activity

Explain how the Internet has aided criminal activity First Computer sciences and Information technology d Explain how the Internet has aided criminal activity.... Explain how the Internet has aided criminal activity Computer crimes involve any illegal act facilitated by the computer, whether this computer is used an instrument or object for the crime.... Provide three (3) specific examples of how the Internet has aided criminal activity Cyber crime: This is the activity, using the internet and computers to steal information or financial credits from business companies, banks or persons....
3 Pages (750 words) Essay

Fandom: Audience and Identity

The advent of the internet has facilitated faster and easier interaction of fans from a wide range of... Name: Institution: Date: A fandom is a group of individuals with a common interest in a subject of any area of human interest or activity.... In today's world, these are the most common interests that garner a lot of fans; the activity itself and the individuals involved these activities.... Fan(s) are characterized by being enthusiastic followers of an activity like sport or entertainment....
12 Pages (3000 words) Essay

Chinese, Japanese, and Korean environmental activists use of Borderless Media

This has changed the whole of reporting scenery of these issues as they are reported regularly thereby making them to be obvious.... The Chinese local newspaper in particular has been under intense pressure from the government to refrain from critically reporting on issues that pertain to the environment.... This essay, Chinese, Japanese, and Korean environmental activists' use of Borderless Media, discusses that one of the critical issues that are proving to be a thorn in the flesh for the media and the public is how environmental issues are tackled by leaders across the different governments....
5 Pages (1250 words) Essay

The Role of the Internet and Crime

et's see the specific examples of how the Internet has aided criminal activity.... Let's take a closer look at how the internet aids criminal activity.... Also such types of criminal activity as computer viruses and malicious codes, cyber stalking and information warfare can damage our personal information.... Drug trafficking is another example of the Internet influence on criminal activity.... The World Wide internet has become an integral element of the modern information environment....
3 Pages (750 words) Essay

Influence of Learning Styles on Practice in Criminal Justice Environment

Activists are willing to venture into any field, and take any activity-based training that suits their needs while on this job.... The fact that its compliance and efficiency has significantly dropped over the years only proves that there are very few mentorship... In such a case, it is thus sufficient to understand how effective each of he learning styles is, the personalities that are best suited by each of these learning styles and the level of their applicability in any given field....
4 Pages (1000 words) Essay

Socializing On the Internet Is Reshaping Our Society

The reality of social networking and continued growth has fuelled debate as to whether social interaction on the internet is reshaping society, particularly when considered in the context of youth culture.... This in turn clearly raises issues about the wider impacts of online social interaction on behavior and society, and this paper critically evaluates whether socializing on the internet is reshaping behavior.... This research will begin with the statement that the incoming of the second media age and multiple digital platforms have created new societal trends and the growth of social networking has created a new social model, which has redefined contemporary culture, particularly youth culture....
11 Pages (2750 words) Research Paper

Organized Crime and Detection: Finding and Maximizing Criminal Data

nbsp; … Preventing criminal activity in the modern era requires the gathering, coordination, analysis and interpretation of massive amounts of data.... There is no more fertile ground for stealthy criminal activity than the murky, pseudo-reality of the Web.... “Secrecy is a key part of organized crime strategy and the internet offers excellent opportunities for its maintenance.... In this context, the internet and the continuing growth of electronic commerce offer enormous new opportunities” (Ibid, 2002)....
11 Pages (2750 words) Research Paper

Forensic Science for Criminal Tracking and Crimes Prevention

Usually, the crime so committed involves the use of scientific equipment in form of the internet users, the phone line used, a transaction made, and the possible use of a computer.... The entire process usually contains three major steps, which have sub-branches beneath them but these three define and describe the activity.... The basic motive of this project is to present modern ways of criminal tracking and crimes prevention.... orensic science in itself is a broader term that has various other fields and specialties merged into it....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us