Cyber Crime

Crime  is  on  the  rise  just  about  everywhere  these  days,  but  nowhere  has  this  up  rise  in  crime  become  more  apparent  than  in  cyber  space.  Like  so  many  other  aspects  of  our  lives,  major  fraud  has  gone  high  tech.

The  FBI  estimates  that  businesses  alone  lose  an  upwards  of  $1.5  trillion  annually  as  a  direct  result  of  cyber  crimes.  The  number  of  these  crimes  has  tripled  in  the  past  two  years  and  the  numbers  continue  to  climb.  (O’Leary  &  O’Leary)  p. 287

Through  the  duration  of  this  essay  we  will  be  embarking  on  a  journey  into  the  dark  and  seedy  world  of  cyber  crime.  Within  this  text  you  will  find,  the  definition  of  cyber  crime,  the  most  typical  types  of  cyber  criminals,  as  well  as  the  most  common  forms  of  cyber  crime.

The  exact  definition  of  cyber  crime  is  still  evolving.  (  www.davislogic.com/cybercrime.htm  ).  Cyber  crime,  or  computer  crime,  is  an  extremely  broad  term.  This  term  is  most  commonly  used  to  describe  criminal  activity  committed  where  a  computer  or  network  is  the  source,  tool,  or  target  of  a  crime.  Like  traditional  crime,  cyber  crime  can  take  many  shapes  and  occur  at  any  time  or  any  place.

When  an  individual  is  the  main  target  of  cyber  crime,  the  computer  can  be  considered  a  tool  rather  than  the  target.  These  crimes  generally  involve  less  technical  expertise  as  the  damage  done  manifests  itself  in  the  real  world.  In  these  types  of  cases  the  damage  dealt  is  primarily  psychological.

By  now  many  of  us   are  all  too  familiar  with  spam.  Spam  or  spamming  refers  to  the  abuse  of  electronic  messaging  systems  to  send  unsolicited  bulk  messages indiscriminately.  While  the  most  widely  recognized  form  of  spam  is  e-mail  spam,  the  term  can  also  be  applied  to  similar  abuses  in  other  media.

Some  of  these  abuses  include;  instant  messaging  spam,  web  search  engine  spam,  spam  in  blogs,  wiki  spam,  mobile  phone  messaging  spam,  social  networking  spam,  as  well  as  internet  forum  spam. As  applied  to  email,  specific  anti-spam  laws  are  relatively  new,  however  limits  on  unsolicited  electronic  communications  have  existed  in  some  forms  for  some  time.

Another  common  crime  plauging  cyber  space  is  identity  theft.  Internet  identity  theft  is  different  from  common  identity  theft  in  a  few  different  ways.  Common  identity  theft  is  different  from  common  identity  theft  takes  place  after  something  is  physically  stolen  from you  like  a  wallet  containing  credit  cards  and  a  driver’s  license  or  an  un-shredded  credit  card  statement from  your  garbage  bin.

The  thief  would  take  these  stolen  articles  and  use  them  to  make  a  fraudulent  purchase  or  something  of  that   nature. Internet  identity  theft  can  be  much  more  devastating  than  conventional  identity  theft  at  times  due  to  the  fact  that  most  victims  of  internet  identity  theft  are  completely  unaware  that  anything  has  been  stolen  from  them  until  it  is  far  too  late.                                                                                                                         Gone  are  the  days  when  we  had  to  step  outside  to  purchase  our  groceries,  book  flights,  and  vacations,  or  simply  transfer  money  between  bank  accounts.

Today,  we  can  simply  grab  our  checkbooks,  debit  cards  or  credit  cards,  sit  down  at  a  computer  in  the  comfort  and  safety  of  our  home,  and  complete  these  transactions  with passwords  and  PIN  numbers.

Thanks  to  advances  in  technology,  the  types of  transactions  we  can  now  complete  online  are  virtually  endless.  Unfortunately,  the  increase  in  online transactions  has  been  accompanied  by  an  increase  in  online  identity  theft.  Fraudulent  access  to  personal information  over  the  internet  is  increasingly  prevalent  and  sophisticated.

Two  forms  of   identity  theft  are  at  the  forefront  of  this  internet  piracy are  phishing  and  pharming.   Both  pharming  and  phishing  are  methods  used  to  steal  personal  information  from  unsuspecting  people  over  the  internet.  Phishing  typically  involves  fraudulent  bulk  email  messages  that  guide  recipients  to  (legitimate  looking)  fake  web  sites  and  try  to get  them  to  supply  personal  information  like  account  passwords.  Pharming  is  in  many  ways  similar  to  phishing.

Pharmers  also  send  emails.  The  consumer,  however,  can  be  duped  by  the  pharmer  without  even opening  an  email  attachment.  The  consumer  compromises  his  personal  financial  information  simply  by opening  the  email  message.

The  pharming  email  message  contains  a  virus  that  installs  a  small  software  program  on  the  end  user’s  computer.  Subsequently,  when  the  consumer  tries  to visit  an  official  web  site,  the  pharmer’s  software  program  redirects  the  browser  to  the  pharmer’s  fake  version  of  the  web  site.  This  allows  the  pharmer  to  capture  the  personal  financial  information that  the  consumer  enters  into  the  counterfeit  web  site,  and  the  consumer’s  account  is  again  compromised.

The  latest  form  of  pharming  does  not  require  email  at  all.  Password  stealing  Trojan  horses  can  attack  through  Microsoft  Messenger  where  key loggers  are  run.  Key loggers  are  viruses  that  track  a  user’s  keystrokes  on  legitimate  sites  and  steal  passwords,  allowing  a  thief  to  have  access  to  a  consumer’s  password  for  future  fraudulent  transactions.

The  most  common  blunder  people  make  when  the  topic  of  a  computer  virus  arises  is  to  refer  to  a worm  or  Trojan  horse  as  a  virus.  While  the  words  Trojan,  worm  and  virus  are  often  used  interchangeably,  they  are  not  exactly  the  same.

 Viruses,  worms  and  Trojan  horses  are  all  malicious  programs that  can  cause  damage  to  your  computer,  but  there  are  differences  among  the  three,  and  knowing  those  differences  can  help  you  to  better  protect  your  computer  from  their  often  damaging  effects.

A  computer  virus  attaches  itself  to  a  program  or  file  enabling  it  to  spread  from  one  computer  to another,  leaving  infections  as  it  travels.  Like  a  human  virus,  a  computer  virus  can  range  in  severity. Some  viruses  may  cause  only  mildly  annoying  effects  while  others  can  damage  your  hardware,  software  or  files.

Almost  all  viruses  are  attached  to  an  executable  file,  which  means  the  virus  may  exist  on  your computer,  however,  it  may  not  actually  infect  your  computer  unless  you  run  or  open  the  malicious  program.

 It  is  important  to  note  that  a  virus  cannot  be  spread  without  human  action,  such  as  running an  infected  program  in  order  to  keep  it  going.  People  continue  the  spread  of  a  computer  virus,  mostly unknowingly,  by  sharing  infecting  files  or  sending emails  viruses  as  attachments  in  the  email.

In  summary,  the  same  types  of  fraud  schemes  that  have  victimized  consumers  and  investors  for  many years  before  the  creation  of  the  internet  are  now  appearing  online.

 In  the  process,  they  not  only  cause  harm  to  consumers  and  investors,  but  also  undermine  consumer  confidence  in  legitimate  e-commerce  and  the  internet.

People  who  commit  cyber  crime  are  cyber  criminals.  Like  cyber  crime,  cyber  criminals  can  take  many  forms.  These  criminals  are  typically  terrorists,  child  predators,  members  of  organized  crime,  employees,  outside  users,  hackers  and  crackers.

  It  is  important  to  point  out  the  difference  between  hackers  and  crackers.  Hackers  are  individuals  who  gain  unauthorized  access  to  a  computer  system  simply  for  the  thrill of  it.  Crackers  do  the  same  thing,  but  for  malicious  purposes.

Computer  hacking  is  most  common  among  teenagers  and  young  adults,  although  there  are  many older  hackers  as  well.  Many  hackers  are  true  technology  buffs  who  enjoy  learning  more  about  how computers  work  and  consider  computer  hacking  an  art  form.  They  often  enjoy  programming  and  have expert  level  skills  in  one  particular  program.

For  these  individuals,  computer  hacking  is  a  real  life  application  of  their  problem  solving  skills.  It  is  perceived  as  a  chance  to  demonstrate,  or  showcase  their abilities,  and  talents,  and  not  an  opportunity  to  harm  others.

Cracking  is  the  act  of  breaking  into  a  computer  system,  often  on  a  network.  Contrary  to  popular  belief,  crackers  are  hardly  mediocre  hackers.   Computer  hackers  were  early  pioneers  of  computing.  These  early  pioneers  were  frantically  dedicated  to  inventing  and  exploring  how  things  worked.  As  a  part  of  the  sixties  generation,  these  hackers  were  also  prone  toward  being  anti-establishment  and  somewhat  disrespectful  towards  property  rights.

Eventually  a  pair  of  these  hackers,  Steve  Wozniak  and  Steven  Jobs,  hacked  together  the  first  commercially  successful  personal  computer,  the  Apple.  The  sixties  generation  hackers  flooded  this  new  industry  and  many  quickly  attained  positions  of  wealth  and  authority  creating  the  information  communications  ecology  that  dominates  Western  life.  Meanwhile,  two  things  happened.

1.       A  new  generation  of  hackers  emerged.

2.      The  world  economic  and  social  order  went  completely  digital,  and  so  crime  as  we  know  it  went  digital  as  well.

It  is  somewhere  at  the  interstices  of  the  new  generation  of  alienated  young  hackers  ( they  sometimes  refer  to  themselves  as  “cyberpunks” )  and  the  world  of  sometimes  organized  crime  that  we  locate the  concept  of  the  cracker.  The  term  is,  to  some  degree,  an  attempt  by  the  now  established  older-generation  hackers  to  separate  themselves  from  computer  crime.

The  debate  still  rages  as  to  what  constitutes  the  difference  between  hacking  and  cracking.  Some  say  that  cracking  represents  any  and  all forms  of  rule  breaking  and  illegal  activity  using  a  computer.  Others  would  define  cracking  only  as  particularly  destructive  criminal  acts.

 Others  would  claim  that  the  early  hackers  were  explicitly  anarchistic  and  that  acts  of  willful  destruction  against  “the  system”  have  a  place  in  the  hacker  ethos,  and  that  therefore  the  term  cracker  is  unnecessary  and  insulting.

This  concludes  our  journey  into  the  world  of  cyber  crime.  Through  the  course  of  our  journey  we  have  successfully  defined  cyber  crime,  identified  typical  cyber  criminals,  and  discussed  some  of   the  most  common  forms  of  cyber  crime.

The  effects  of  cyber  crime  are  far  reaching.  It  would  be  a  difficult  task  to  find  someone  who  has  never  been  affected  by  malicious  internet  activity,  or  who  does  not at  the  very  least  know  someone  who  has  been  negatively  impacted  by  cyber  criminals.

 Advances  in internet  technology  and  services  continue  to  open  up  innumerable  opportunities  for  learning,  networking and  increasing  productivity.  However,  malware  authors,  spammers  and  phishers  are  also  rapidly  adopting  new  and  varied  attack  vectors.

If  the  internet  is  to  become  a  safer  place,  it  is  imperative  to  understand  the  trends  and  developments  taking  place  in  the  internet  threat  landscape  and  maintain  online security  practices.  Internet  threats  continue  to  increase  in  volume  and  severity.

It  is  important  that  computer  users  are  on  guard  in  order  to  make  themselves  less  vulnerable  to  risks  and  threats.  Staying on  top  of  the  trends  and  developments  taking  place  in  online  security  is  critical  for  both  industry  researchers  and  all  computer  users  alike.

 References

     O’Leary,  T. J. ,  &  O’Leary  L.  I.  (  2008  ) .  Computing  essentials  introductory  2008.

                  New  York:  The  McGraw-Hill  Companies.

     Cyber  Crime.  (  2008  ) .  Types  of  cyber  crime.  Retrieved  September  27th  ,  2008 ,

                  From  http://www.davislogic.com/cybercrime.htm

Writing Quality

Synonyms

A (97%)

Redundant words

B (85%)

Originality

100%

Readability

F (45%)

Total mark

B

Read more

Cyber Crime and Targets

The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired.

There is a line that often blurs between legitimate and illegal behavior, when does harsh criticism become bullying, when does an expression of affection become harassment and how do the authorities differentiate between someone looking up an old classmate for rekindle a friendship and stalking a former girlfriend that spurned their overtures. The constitutional protections of free speech and requirements of specificity of regulations make the criminalization of inappropriate behavior.

CAUSES OF CYBER – CRIME

There are many reasons why cyber-criminals commit cyber-crime, chief among them are these three listed below:

Cyber-crimes can be committed for the sake of recognition. This is basically committed by youngsters who want to be noticed and feel among the group of the big and tough guys in the society. They do not mean to hurt anyone in particular; they fall into the category of the Idealists; who just want to be in spotlight. Another cause of cyber-crime is to make quick
money. This group is greed motivated and is career criminals, who tamper with data on the net or system especially, e-commerce, e-banking data information with the sole aim of committing fraud and swindling money off unsuspecting customers.

Thirdly, cyber-crime can be committed to fight a cause one thinks he believes in; to cause threat and most often damages that affect the recipients adversely. This is the most dangerous of all the causes of cyber-crime. Those involve believe that they are fighting a just cause and so do not mind who or what they destroy in their quest to get their goals achieved. These are the cyber-terrorists.

HOW TO ERADICATE CYBER – CRIME

Research has shown that no law can be put in place to effectively eradicate the scourge of cyber-crime. Attempts have been made locally and internationally, but these laws still have shot-comings. What constitutes a crime in a country may not in another, so this has always made it easy for cyber criminals to go free after being caught.

These challenges notwithstanding, governments should in the case of the idealists, fight them through education not law. It has been proven that they help big companies and government see security holes which career criminals or even cyber-terrorist could use to attack them in future. Most often, companies engage them as consultants to help them build solid security for their systems and data.

“The Idealists often help the society: through their highly mediatised and individually harmless actions, they help important organizations to discover their high-tech security holes….”# The enforcement of law on them can only trigger trouble, because they would not stop but would want to defy the law. “ Moreover, if the goal of the cyber-crime legislation is to eradicate cyber-crime, it mint well eradicate instead a whole new culture, in education is a much better way to prevent their actions.

Another means of eradicating cyber-crime is to harmonize international cooperation and law, this goes for the greed motivated and cyber-terrorists. They can not be fought by education, because they are already established criminals, so they can not behave. The only appropriate way to fight them is by enacting new laws, harmonize international legislations and encourage coordination and cooperation between national law enforcement agencies.

WHO ARE INVOLVED:

Those involved in committing cyber-crimes are in three categories and they are: THE IDEALISTS (Teenager). They are usually not highly trained or skilful, but youngsters between the ages of 13 – 26 who seek social recognition. They want to be in the spotlight of the media. Their actions are globally damageable but individually negligible. “Like denying a lot of important e-commerce servers in February, 2000 is said to have caused high damages to these companies.”# Most often they attack systems with viruses they created; their actual harm to each individual is relatively negligible. By the age of 26 to 26 when they have matured and understood the weight of their actions, they lose interest and stop.

THE GREED – MOTIVATED (Career Criminals).

This type of cyber-criminals is dangerous because they are usually unscrupulous and are ready to commit any type of crime, as long as it brings money to them. “They started the child pornography often called cyber-pornography which englobes legal and illegal pornography on the internet.”# They are usually very smart and organized and they know how to escape the law enforcement agencies. These cyber-criminals are committing grievous crimes and damages and their unscrupulousness, particularly in child-pornography and cyber-gambling is a serious threat to the society.

Example to show how serious a threat they pose to the society is “the victim of the European bank of Antigua are said to have lost more than $10million”# “…theft of valuable trade secrets: the source code of the popular micro-soft windows exploration system by a Russian based hacker could be extremely dangerous… the hackers could use the code to break all firewalls and penetrated remotely every computer equipped with windows were confirmed. Another usage could be the selling of the code to competitors.”#

THE CYBER – TERRORISTS. They are the newest and most dangerous group. Their primary motive is not just money but also a specific cause they defend. They usually engage in sending threat mails, destroying data stored in mainly government information systems just to score their point. The threat of cyber-terrorism can be compared to those of nuclear, bacteriological or chemical weapon threats. This disheartening issue is that they have no state frontiers; can operate from any where in the world, and this makes it difficult for them to get caught. The most wanted cyber-terrorist is Osama Bin Laden who is said to “use steganography to hide secret messages within pictures, example, a picture of Aishwarya Rai hosted on the website could contain a hidden message to blow up a building.”# A surprising fact is that these hidden messages do not alter the shape, size or look of the original pictures in any way.

HOW TO DETECT A CRIMINAL MAIL

A criminal mail is usually sent to networks with the aim of either corrupting the system or committing fraud. The way to detect such mails is by putting security measures in place which would detect criminal patterns in the network. News Story by , of IDG News Service says that Unisys Suite has a system called the “Unisys Active Risk Monitoring System (ARMS) which helps banks and other organizations spot patterns of seemingly unrelated events that add up to criminal activity.”#

Actimize Technology Ltd based in New York has developed technology that enables organizations to do complex data mining and analysis on stored information and transaction data without needing to copy it to a separate data warehouse. “The actimize software runs on the Microsoft Corp. Windows NT or Windows 2002 platform and can be developed on standard server hardware with either four to eight processors, Katz said.”#

Eric J. Sinrod in his article ‘What’s Up With Government Data Mining’ states that the United States “Federal Government has been using data mining techniques for various purposes, from attempting to improve service to trying to detect terrorists patterns and activities.”# The most effective way to detect criminal mails is to provide security gadgets, educate employees on how to use them, and to be at alert for such mails, above all, making sure no security holes is left unattended to.

CONCLUSION

It has been deduced from this study that reliance on terrestrial laws is still an untested approach despite progress being made in many countries,
they still rely on standard terrestrial laws to prosecute cyber-crimes and these laws are archaic statutes that have been in existence before the coming of the cyberspace. Also weak penalties limit deterrence: countries with updated criminal statutes still have weak penalties on the criminal statutes; this cannot deter criminals from committing crimes that have large-scale economic and social effect on the society.

Also a global patchwork of laws creates little certainty; little consensus exist among countries regarding which crimes need to be legislated against. Self-protection remains the first line of defense and a model approach is needed by most countries; especially those in the developing world looking for a model to follow. They recognize the importance of outlawing malicious computer-related acts in a timely manner or in order to promote a secure environment for e-commerce.

Cyber-crime with its complexities has proven difficult to combat due to its nature. Extending the rule of law into the cyberspace is a critical step towards creating a trustworthy environment for people and businesses. Since the provision of such laws to effectively deter cyber-crime is still a work in progress, it becomes necessary for individuals and corporate bodies to fashion out ways of providing security for their systems and data.

To provide this self-protection, organizations should focus on implementing cyber-security plans addressing people, process and technology issues, more resources should be put in to educate employees of organizations on security practices, “develop thorough plans for handling sensitive data, records and transactions and incorporate robust security technology- -such as firewalls, anti-virus software, intrusion detection tools and authentication services.

By way recommendations, these kinds of actions are suggested following the weak nature of global legal protection against cyber-crime:

•Firms should secure their network information. When organization provides security for their networks, it becomes possible to enforce property rights laws and punishment for whoever interferes with their property.

•Laws should apply to cyber-crime—National governments still are the major authority who can regulate criminal behavior in most places in the world. So a conscious effort by government to put laws in place to tackle cyber-crimes would be quite necessary.

•There should be a symbiotic relationship between the firms, government and civil society to strengthen legal frameworks for cyber-security. An act has to be crime in each jurisdiction before it can be prosecuted across a border. Nation must define cyber-crimes in similar manner, to enable them pass legislation that would fight cyber-crimes locally and internationally.

Read more

Cyber Crime & internet

The full realization of the potential benefits brought by internet in the global community is greatly sabotaged by cyber crime activities. Cyber crime is increasingly becoming a major concern across the social, scientific, economic, and law enforcement fronts of the global community. Although the actual economic impact of cyber crimes is hard to qualify, it is estimated that the American nation looses over $100 million on internet related crimes every year. There are numerous types of cyber crimes (Laser, 2009).

These includes; identity theft, fraud, hacking, cyber terrorism, malicious computer programs, web posting of offensive materials, and drug trafficking among others. Due to the negative social and economic impact of cyber crime activities, governments and other stakeholders have engaged in a number of prevention measures. They encompass creation of public awareness to enable internet users to identify, report, and/or avoid being victims of such crimes (McDowell, 2008). Software scientists have also engaged in developing effective computer and network security software.

In addition to this, there are laws such as the Intellectual Property Law, Electronic Communication Privacy Law, and the 2001 Patriotic Act serve an important role in detecting and prosecuting cyber crime offenders. This essay seeks to discuss malicious computer programs (also know as malware) as a form of cyber crime, its characteristics and how it is prevented, detected, and/or prosecuted. Malicious computer programs are defined as coded programs, which serve either to corrupt the effective functioning of a computer system or lead to unwarranted remote accessing of information from a computer network (Loader, Douglas, & Thomas, 2000).

Viruses and worms are the most common types of malicious computer programs or software. Other malicious computer programs include spyware, and Trojan. They are codes which serve to compromise information stored in computer network devices. This type of malicious computer programs is commonly associated with infecting executable computer files and denial of network access by authorized users (Loader, Douglas, Thomas, 2000). Indeed, through extensive infecting of computer files, such codes are responsible for crashing of computer network devices.

Other common forms of malicious computer programs are deceptive Trojan horses, multi-purpose bots, and spyware programs. This is increasingly becoming a common cyber crime. Such programs are characterized by their ability to allow for the stealing of sensitive information from protected networks (Metropolitan Police, 2009). According to available information on these malicious computer programs, they can serve to aid a hacker in remotely accessing passwords and credit card details of network users without detection.

In addition, due to their sophisticated capability, such programs are employed for facilitating corrupting of confidential information stored institutional networks (Loader, Douglas, & Thomas, 2000). Such can also be used by terrorist groups to qualify the crucial information from their target government prior to attacks. There are numerous ways established for preventing malicious computer programs as a cyber crime activity. The most common measure is the creation of awareness among the general public and institutions on how to identify and mitigate being affected malicious computer programs (McDowell, 2008).

To realize this preventive measure, network software scientists have engaged in numerous researches; developing highly intelligent network security software. Indeed, some software such as antivirus are commonly found free in the internet. Such are serving the crucial purpose of mitigating infection of computer networks by malicious computer codes such as virus and worm among others. Still, this intelligent network security software brings with them the ability to identify and deny access of systems by unauthorized users (Lasar, 2009).

According to available research findings on the effectives of malicious computer programs, it is clearly established that some forms of these programs which are hard to control. In a move to protect the integrity of information technology in the society, it is a common practice for highly sensitive institutions to close down their networks upon realizing any errant behaviors. It is worth noting that such moves are instrumental in ensuring the continued illegal access of networks by hackers. This is usually followed by a change of the overall access security codes and other check requirements.

Indeed, for security codes of highly sensitive institutional networks, constant changing is recommended to reduce access chances by hackers. The process of detecting and prosecuting cyber crimes is quite complex. This has been closely attributed to the fact that offenders in these crimes employ high sophisticated technologies (Metropolitan Police, 2009). It is commonly claimed that thieves are usually ahead of technology. Another problem compromising the process of detecting and prosecuting malicious computer programs crime offenders is low rates of reporting such crimes by the victims (McDowell, 2008).

Such have also been associated by the failure of network company providers to cooperate with the law enforcement in identifying such incidences. Despite these drawbacks, the war on malicious computer programs as a cyber crime activity has employed a number of methods. First is the use of computer forensic investigation practices to qualify evidence of suspect malicious computer program offender (Lasar, 2009). This process involves technological analysis of collected data by forensic computer scientists.

It is to be underscored that according to existing laws such as the Intellectual Property Law and Electronic Communication Privacy Law provides for legal suits against the programmers and distributors of malicious computer programs (Loader, Douglas, Thomas, 2000). Another commonly used measure in detecting cyber crimes is the tapping of communication networks by law enforcement agents. Although this method has received heavy critics for interfering with the privacy and confidentiality of communication, it serves great purpose in mitigating unwarranted access of sensitive networks.

The Patriotic Act of 2001, which allows for government surveillance of the internet, is aimed at mitigating terrorist activities. According to the provisions of the Act, law enforcement is given legal authority to intercept internet communications by crime suspects. Another crucial provision of the Act is its mandatory dictate for network providers to cooperate with the law enforcement in identifying the original of a given communication of malicious programs. Based on this reason, the process of detecting malicious computer programs has significantly improved with the enforcement of the Patriotic Act.

Another measure of detecting cyber crime activities is the modern streamlining of the reporting and responsiveness practices in the law enforcement (McDowell, 2008). This encourages institutions and individual victims of malicious computer programs to report such incidences, thus enhancing the process of mitigating such criminal activities by the law enforcement agencies. In conclusion, the escalating problem of cyber crime activities is increasingly compromising the realization of the potential benefits brought internet technological advancements in the community.

Although all cyber crimes have negative social and economic impacts in the society, malicious computer programs are a real threat to the security of nations across the global. Such programs are evidently blamed for corrupting executable computer network file, crashing of network devices, denying access by authorized users, and allowing access of private information by hackers. Therefore, there is need for more consulted efforts by the computer security software scientists, law enforcement, and other stakeholders to engage in formulating effective measures of fighting cyber crime. References Lasar, M. (2009).

An introduction to the FBI’s anti-cyber crime network. Retrieved May 28, 2010, from http://arstechnica. com/web/news/2009/11/an-introduction-to-the-fbis-anti-cybercrime-network. ars Loader, B. , Douglas, T. , & Thomas, D. (2000). Cyber crime: Law Enforcement, Security, and Surveillance in the Information. New York: Routledge. McDowell, M. (2008). National Cyber Alert System. Retrieved May 28, 2010, from http://www. us-cert. gov/cas/tips/ST05-006. html Metropolitan Police. (2009). Trojan’ computer arrests. Retrieved May 28, 2010, from http://cms. met. police. uk/news/arrests_and_charges/trojan_computer_virus_arrests

Read more

What Is Cybercrime?

Cybercrime, or PC arranged wrongdoing, is wrongdoing that includes a PC and a network. The PC may have been utilized in the commission of a wrongdoing, or it might be the target. Cybercrimes can be characterized as: “Offenses that are perpetrated against people or gatherings of people with a criminal thought process to purposefully hurt […]

Read more

Cyber Crime & internet

The full realization of the potential benefits brought by internet in the global community is greatly sabotaged by cyber crime activities. Cyber crime is increasingly becoming a major concern across the social, scientific, economic, and law enforcement fronts of the global community. Although the actual economic impact of cyber crimes is hard to qualify, it […]

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp