Free Essay

Cybercrime

In:

Submitted By goldieacosta
Words 2224
Pages 9
Since the early 1990s, the internet has grown technologically faster and with more capabilities than any other type of technology in the world, leaving the United State with a sense of fear with this type of network being a risk to our national security. While most of us find the internet to be a great tool of information, and unlimited capabilities, it can devastate us personally and financially. The internet can increase the risk of theft, fraud and even the possibility to suffer from a cyber-attack or even worse a cyber-terrorism, leaving our country at risk especially for those who work in the government defense agencies and private corporations. In 2003, the conflict with Iraq created a round of speculations that the United States was going to experience cyber-attacks in revenge (Clarke). But, since 1995 there haven’t been any reports of cyber-attacks that would produce panic or damage to U.S. infrastructure or that affects our military operations. By any means this is not a result of idleness by terrorist groups. Between 1996 and the end of 2001 there was 1,813 international terrorist attacks performed. To mention a few that involved citizen targets, there is the Khobar Tower Bombing in June 1996, the Embassy Bombing in East Africa in August 1998, and the USS Cole attack in October 2000. Between 1996 and 2003, to compare between terrorist attacks around 1,813, computer security incidents around 217,394 and cyber-attacks on infrastructure which they were 0, reporters have noted that the cyber terror on infrastructure are an unlikely threat to the security of the United States. In 2005, Cyber-attacks cost were $48 billion to businesses and $680 million to consumers. While a physical attack involves weapons against a specific target, a cyber-attack includes codes that are used as weapons to infect enemies’ computer in order to manipulate the software, system configuration or the use of restricted computer system.
Although cyber-attacks has taken place against critical infrastructure, industry, and companies, the gathered data cannot be used to determine if a terrorist group has initiated these attacks. One of the concept that is creating a big concern in our infrastructure is the term cyber terrorism. Cyber terrorism can be define as the use of a computer as a weapon or as a target by any group who threaten to cause violence and fear with the purpose of influence to an audience or produce a government to change its policies (Wilson). Like terrorism, cyber terrorism is used to intimidate the government in order to change their opinions about social objectives. In order to be consider cyber terrorism, attacks perform against a person of property should cause enough harm, such as attacks that lead to death, explosions, and economic loss. There are many reasons why a terrorist would want to conduct cyber terrorism. First, cybercrime is a cheaper method that consist on the use of a computer and an online connections, without the necessity to buy weapons or any type of explosive. Second, the cyber terrorism remains anonymous, which means the terrorist can use any unidentified user and police force will not be able to identify the terrorist real identity. Third, there is a tremendous amount of people that can be targeted as long as weaknesses are shown. These include but not limited to computers and networks of airlines, government agencies, public utilities, certain individuals who have high level clearance, etc. Fourth, cyber terrorism does not required physical training, the risk of death or any regular activity performed by terrorist. Fifth, cyber terrorism has the probability to affect people directly, in a way that it will generate media coverage, which as we already know is what terrorist wants.
However, cyber-attacks are more usual in our daily basis than cyber terrorism. As a matter of fact there are no records of cyber terrorism in the U.S. According to the FBI, there are 18 cyber’s most wanted due to racketeering, assessing computers without authorization for financial gain, computer fraud, money laundering and so on but these individuals are considered hackers, with no political goals and desires, therefore it cannot be considered cyber terrorism. Based on the information above, it is really hard to determine the level of relevance, or the capabilities of terrorist groups to send an effective cyber-attack (Wilson). Some observers also conclude that Al Qaeda does not seems interesting in cyber terrorism to achieve his goals because they preferred to cause human casualties. There is another group of observers that believe that cyber terrorism are terrorist who works in post-industrial societies, such as Europe and the United States, unlike international terrorist that operate in regions with limited access to our high technology (Wilson). As in any other situation, the federal government has created preventing measures to help improve its own computer security and to urge the private sector to also accept tougher security measures in order to be able to reduce infrastructure vulnerabilities.
So far we can agree that the cyber terrorism threat have been overstated, but we cannot ignore it. A reason for this can be the differences in goals and motives for terrorists. Terrorist try to make political statement and to impose psychological and physical damage on their targets for which the goal is not going to be achieved in cyber terrorism if the effects may not even be noticed or, in the scenario of an economic attack, damage might be slow and cumulative. There are four types of attacks that can be appealing to terrorist to commit cyber terrorism. The first type is large- scale Distributed Denial of Service (DDoS) attacks used to attack IT infrastructure. These attack represent some viruses, worm and Trojan horses to control other computers. The distribution is by email or ftp transactions, media sharing or a concealed code in a website. For terrorist this attack can be interesting because it can be rented to third parties as a source of income. They can also be used for terrorist propaganda, or to bring down an adversary. The second type of attack is conventional hacking to gain access to specific computers. In this case if the attack is successful with relevant data, the terrorist can take advantage of it, by stealing or damaging the data such as, financial institution’s records or military top secret documents which are not immune to this attack (Davis). The third type is hybrid attacks, which they can cause the utmost damage. It combine the first two type of attacks with a bomb attack. The last type of attack points toward the physical world, it tend to manipulate IT system that functions are to control systems, such as railway, thus able to cause damage to the physical goods. These four attacks can cause severe damage, but no human lives would be compromised. When human lives are not involved in the scenarios is when is questionable whether these attacks are an interest option for terrorist. A terrorist goal is to be able to see fear in the public and to create physical harm to our society. Cyber terrorism would not fulfill the terrorist goal.
However, we have seen aside from the cyber-attacks, how terrorist have begun using the internet has a source of communication to plan their attacks. By the use of the internet they can communicate with other groups of people who are interested in participating in a terrorist attack and also, terrorist can use the internet to provide information to anonymous contacts (Clarke). Consequently, we can assume that terrorist prefer to use the internet for nonviolent acts because is more effective for the group and the achievement of their goals.
Even though there is no evidence of cyber terrorism, is imperative for people to be aware of the negative impact that can create to our Infrastructure. The Council of Europe’s Convention on Cybercrime is one of the broadest instrument when it comes to address computer crime. Articles 2 and 3 address the illegal access and the illegal interception and articles 4 and 5 address the data interference and system interference which covers the offenses against the confidentiality, integrity and availability of computer data system (Convention on Cybercrime). Also the Department of Justice has an organization called, The Computer Crime and Intellectual Property Section (CCIPS) who is responsible for implementing strategies in combating computer and intellectual property crimes worldwide. CCIPS work with other agencies in order to prevent, investigate and prosecutes computer crimes. The Department of Homeland security has also collaborated to improve cyber security utilizing The Secret Service in order to maintain Electronic Crime Task Forces (ECTFs). ECTF focus on classifying and finding international cyber criminals that are link to cyber intrusions, bank rob, and any other computer crime.
The Nation’s critical infrastructures are comprised of both public and private institutions divided by sectors. These sectors include but not limited to agriculture, food, water, government, emergency services, information and telecommunications, transportation, energy, banking and finances, chemicals and hazardous, and postal and shipping. These cyberspace is the control system of our country (Pearson). It is compose of thousands unified computers, servers, and routers that permit our critical infrastructure to work. Our critical infrastructure, define by the USA Patriot Act, is the system and assets so fundamental to the United States that the loss or damage to those system would have a devastating impact on security, national economic security, national public well-being, and the combination of those matters (Pearson). There is a National strategy to be followed by every individual in order to secure their personal assets, and to be able to control and operate the portions of the cyberspace that we operate. Securing our cyberspace is a challenging strategic that requires the effort from the whole society. By securing our cyberspace we can reduce the vulnerability of a cyber-threat. The internet is also a source to conduct espionage on our government, universities and private companies which can absolutely corrode the public trust in information system. If by any change our system gets corroded by cyber terrorism it will greatly have an effect on our society. Because everyone reacts differently, some people will be directly affected, in the event of a loss to a retail company’s information, others will be distress by the attack to their email and other electronics. Some retail company’s would suffer great amounts of losses due to the panic of the people. The importance is to keep our society informed of the consequences of cyber terrorism and to be aware on how to deal with the threats if it were to present itself. There are many steps that can be taken by each and every party involved. For example, groups that have been directly affected must be more forceful in pursuing the criminal. This might be costly but if the criminal is caught he must and will be prosecuted to the full extent of the law, assigning very harsh punishments to be able to deter anyone who may think of committing such acts (Clarke). Corporate organizations should also be proactive about the possibilities of these attacks, by remaining updated on information, they should also and most importantly maintain a security posture. It is important that companies improve their security infrastructure. An organization is responsible of the increase to the consciousness on cyber terrorism to their workers. As any other threat we have to understand that it is only a matter of time before something where to happen as for terrorist to penetrate with cyber terrorism and break into our infrastructure. By following the core values of integrity we can supersede any of the threats of cyber terrorism against our society. We have to become more vigilant of our surroundings and by any means get comfortable with the technology that surrounds us. Technology is a powerful tool, that help us to solve any problem and without it the combined knowledge would be lost.

Conclusion:
From our studies we can determined that terrorist are opportunistic. They will use any single weakness we leave unprotected, and they will choose the right time, and the right method of attack according to the weaknesses they observe. Terrorist planned for months even years in some cases, to make an attack without mistake, that can affect our society in a way that we cannot recover easily, like the 9/11 attacks. They also use pre attack surveillance, to be able to provide information to the terrorist leaders. We always have to be vigilant of the small details that can be detrimental to our safety. If, as a society, we understand the importance of securing our information, we can significantly reduce America’s vulnerability, especially to the most damaging attacks.

References:
Clarke, D. (2004). Technology and terrorism. (Vol. 16). Library of Congress
Convention on Cybercrime (2001) Retrieved from: http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm
Strasbourg (2007). Cyber terrorism: The use of the internet for terrorist purposes. Council of Europe Pub.
White, J.R. (2014). Terrorism and homeland security (8th ed.). Belmont, CA: Wadsworth Cengage Learning.
White, R., Markowski, T., & Collins, K. (2012). The United States Department of Homeland Security: An overview (custom ed.). Boston: Pearson Learning Solutions.
Wilson, C. (2005, April 1). Computer Attack and Cyber terrorism: Vulnerabilities and Policy Issues for Congress. Retrieved from: http://www.history.navy.mil/library/online/computerattack.htm

Similar Documents

Premium Essay

Cybercrime

...Cybercrime There are approximately 40 federal statutes that govern the prosecution of computer-related crimes. Some of the most prominent are the Copyright Act, the National Stolen Property Act, mail and wire fraud statutes, the Electronic Communications Piracy Act, the Communications Decency Act of 1996, the Child Pornography Prevention Act, and the Child Pornography Prevention Act of 1996. Congress recognized computer related computer-related crimes as discrete federal offense with the passage of the counterfeit access device and computer fraud and abuse law in 1984. So as you can see there are quite a few different statutes that apply to computer crime. As for local and state statutes that involve cybercrime there is not too many. In Michigan the terms of cybercrime are these. Mental state must be intentional, misdemeanor if violation involves $200 or less, felony if violation involves more than $1000, attempt is not considered a crime, and civil lawsuits are not permitted. Federal, state, and local statutes apply to the phenomenon of cybercrime by more and more cybercrimes happening and being taken into court proceedings. For example there was a case recently where the US government charged 8 people in a cyber-crime scene that netted close to $45 million dollars in just a few hours. Many of these crimes do not have clearly drawn lines on what charges will be applied to what crime so statutes must be followed to decide the severity of the crime and the punishment....

Words: 255 - Pages: 2

Free Essay

Cybercrime

...Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? At the rate technology is evolving, and all the monetary transactions going on, it can create an attraction for thieves. Major types of cybercrime can be anything from illegal betting, to identity theft, or more serious crimes such as human trafficking and child pornography. “to find violators and also propose new legislation to protect law-abiding citizens from cyber-crimes.” There are something we can do to protect ourselves from cybercrime like having anti-spyware, virus protection and malware software, but even with all of that we still might need some help. The government has tried to step up, and protect us but their efforts don’t always lead to a physical person to be punished for their crimes. Cyber bullying is a serious issue in today’s schools and business. If everyone adopted and educated people on netiquette guidelines would this issue be solved? Explain. It may help in a small way, but it will not eliminate the problem, because although we might not like to admit it we tend to be bullies on and off line. If we educate our kids and ourselves on how to behave and treat people well, that might have an impact on other people that are victims of cyber-bullying. It is a serious subject, there has been rumors that teenage kids have committed suicide, as a result from being bullied. “There also have been...

Words: 509 - Pages: 3

Premium Essay

Cybercrime

...Cybercrime Gabriela Peralta and James Walton CJA/204 April 5th, 2015 Robert Quesada Cybercrime The dark side of new technologies, as far as the justice system is concerned, is the potential they create for committing old crimes in new ways or for committing new crimes never before imagined; one of these ways is Cybercrime. Cybercrime is act of crime when using a computer and the Internet. Cybercrime, or computer crime, focuses on the information stored in electronic media, which is why it is sometimes referred to as information technology crime or info crime. This can be anything from downloading illegal music file to stealing money from online bank accounts. Cybercrime can also include non-monetary offenses, such as creating and distributing viruses on other computers or posting business information on the Internet that is meant to be confidential. There is no boundaries or jurisdictions when it comes to cybercrime ŞTEFAN, I. (2011). Below is three known cybercrimes though there are many more cybercrimes in the past and the future these are just a few. This cybercrime is considered being the biggest attack in US history. Five hackers hacked into companies like NASDAQ, Visa Inc., J.C. Penny Co, Jet blue airways Co, and Carrefour SA. They caused over 300 million to these companies. The hackers primarily wanted to steal and sale the 160 credit card numbers they stole from the companies. Authorities say each man had their own role, two hacked networks, another mined...

Words: 1242 - Pages: 5

Premium Essay

Cybercrime

...Cybercrime: The Real Deal Reginald McInnis SEC 402 Information Warfare and Homeland Security Strayer University Spring 2012 Instructor: Professor Scott McCrea In our society there are many different way of communication around the world. With the rapid usage of the Internet and the access of personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi...

Words: 2360 - Pages: 10

Premium Essay

Cybercrimes

...characteristics like being easiest and also quickest way of committing it. In a simple way it can either be defined as a combination of crime and computer. Or any offence or crime in which involved are computers and networks. Origins of Cybercrime combine the term crime with the root cyber from the word cybernetic, from the Greek, kubernân, which means to lead or govern. The cyber environment includes all forms of digital activities, regardless of whether they are conducted through networks and without borders. This extends the previous term computer crime to encompass crimes committed using the Internet, all digital crimes, and crimes involving telecommunications networks. For example, cybercrimes can range from being fraud to unrequested emails (spam). They can also steal both government and corporate secrets by hijacking through official sites. These crimes also involve in stealing huge amounts of money from online bank accounts. Cybercrimes can also indulge in non-money offenses like creating viruses on others computers or posting some confidential information on the internet. (Which at once affected entire world except India as our people doesn’t possess any protection to our computers). In altogether, these cybercrimes can never amount to a single category. As we have them committing in various ways and places. Unlike other countries, cyber Crime is not defined in Information Technology Act 2000 or in the I.T. Amendment Act 2008 or in any other legislation...

Words: 526 - Pages: 3

Free Essay

Cybercrime

...Nowadays, E-commerce is a fundamental part of marketing activity. Most of e-commerce proceeds on the websites of publicly traded companies. A challenge that e-business face is that vulnerably experience e-crime, also known as cybercrime. As Internet technology continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Various types of Cyber crimes that can be encountered over the net are spam, fraud, cyber terrorism and so on. Whether for individuals, companies or governments, cybercrime has become a big problem. Spam is defined as unsolicited junk e-mail. It is used by chain mailers, forger and some others who selling dubious products.  “The Federal Trade Commission (FTC) has identified 12 types of scams that are most likely to arrive in consumers’ e-mail boxes. The “dirty dozen” are: business opportunities, bulk e-mail, work at home schemes, health and diet scams, effortless income, free goods, investment opportunities, cable descrambler kits, guaranteed loans or credit on easy terms, credit repair, and vacation prize promotions”(Phommalinh). Meanwhile, the most common type of cybercrimes occurred in spam is virus which spread by e-mails. When one receive an e-mail with a virus, the default settings of your computer do not have any action required to resist virus. At that point, virus can follow instructions and does anything whatever...

Words: 1173 - Pages: 5

Premium Essay

Cybercrime

...years has led to the increase in new form of crime – cybercrime – throughout the world. Cybercrimes are responsible for the interruption of normal computer functions and have been known to cause the downfall of many companies. This research paper aims to discuss following aspects of cybercrimes: the definition, who they affect and some cybercrime prevention procedures. Broadly speaking, this report will display all necessary information helping people avoid being victims of cybercrimes. Table of contents ABSTRACT 1. Introduction 2. Discussion of findings 2.1. What are cybercrimes? 2.2. What are the effects of cybercrimes? 2.3.1. Potential economic impact 2.3.2. Impact on consumer trust 2.3.3. Impact on national security 2.3. How to prevent cybercrimes? 2. Conclusion REFERENCES 1. Introduction In our modern technology-driven age, keeping our personal information private is becoming more and more difficult. The truth is, highly classified details are becoming more available to public databases because we are more interconnected than ever. This creates a negative stigma that the use of technology is dangerous because practically anyone can access one’s private information for a price. Technology continues to promise to ease our daily lives, however, there are dangers of using technology. One of the main dangers of using technology is cybercrimes. Cybercrimes are any crimes that cause harm to another individuals...

Words: 1762 - Pages: 8

Free Essay

Cybercrime

...Cybercrime With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world. Differences between Cybercrime and Traditional Crime For an individual to fully understand the difference between cybercrime and traditional crime, the individual needs to understand what cybercrime is. The definition of cybercrime is according to "Oxford Dictionaries" (2014), "crime conducted via the internet or some other computer network" (cybercrime). Cybercrime is committed by hackers with the goal of financial gain in min by stealing personal information(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are many different categories for cybercrime but the main four include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are charged on a state law level; however, there are plenty of federal laws that can be violated through committing cybercrime. The main difference that needs to be known is that when cybercrimes are committed, the...

Words: 1128 - Pages: 5

Free Essay

Cybercrime

...They have helped increase productivity and made our lives so much easier. Due to the ease computers have made, it has also opened a door for a new breed of criminal. Cybercrime is on the rise. Cybercriminals use the Internet to spread their viruses, worms, and other hacking tools, like phishing, to steal people’s identity or sign them up for expensive services, which they reap the profits. However, some of these criminals do it for thrill of the chase. According the reading CompCriminal.doc there are two types of cybercriminals, the non-professional hacker and the professional hacker. Another form a cyber-attack called the DoS attack or denial-of-service. “The attack is designed to paralyze websites, financial networks and other computer systems by flooding them with data from outside computers.” (James, 2009). The first document case of a DoS attack was in 2000 by a 15-year old Canadian boy nicknamed “Mafiaboy”. This attack was against several e-commerce sites including eBay.com and Amazon.com. There have been several other hackers prior to “Mafiaboy”. Two of the notorious cybercriminals were Kevin Mitnick and Robert Morris. In 1982, Mitnick broke into the North American Air Defense Command’s computer system. Mitnick was arrested, and convicted for his cybercrimes 1989, which was the first time he was convicted. In 1988, Morris created an Internet worm, which halted almost all Internet activity. He claimed it was an experiment, which...

Words: 1009 - Pages: 5

Premium Essay

Cybercrime

...Case Study – Cybercrime International Centre for Criminal Law Reform and Criminal Justice Policy 1822 East Mall, Vancouver British Columbia, Canada V6T 1Z1 Tel: 1 (604) 822-9875 Fax: 1 (604) 822-9317 Email: icclr@law.ubc.ca www.icclr.law.ubc.ca Case Study – Cybercrime By Annemieke Holthuis Counsel Criminal Law Policy Section Department of Justice Canada Case Study prepared for Co-Teaching at the National Prosecutors College Beijing China November-December 2006 As part of the International Centre for Criminal Law Reform and Criminal Justice Policy (ICCLR) and GeoSpatial SALASAN Programme: The Canada China Procuratorate Reform Cooperation Project, supported by the Canadian International Development Agency 2 Case Study - Cybercrime Public concern about the incidence of child pornography on the Internet is increasing in British Columbia. The police decide to crack down and seek the help of members of the public and Internet Service providers like XYZ Corporation. Brian, a concerned citizen and the divorced father of a young girl, contacts police expressing concerns about his roommate Dwayne. Dwayne is always on the computer and he has no idea what Dwayne is doing. Dwayne’s door is always locked and Dwayne won’t let Brian borrow the computer, even to send a quick e-mail. Lately, Dwayne acts more strangely than ever. Brian said that he didn’t know what it is but he’s no longer comfortable bringing his daughter home when Dwayne was there. Brian mentions...

Words: 7138 - Pages: 29

Premium Essay

Cybercrime

...Abstract Cybercrime is a crime committed on the Internet using the computer as a tool and in some cases a targeted victim. The term “cyber” is a misdemeanor and is not defined (Dashora, 2011). Cybercrime is similar to conventional crime both include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering...

Words: 340 - Pages: 2

Premium Essay

Cybercrime

...Cyber Crime has become a top priority for law enforcement on a local, state and federal level. We are becoming increasingly concerned about cyber threats, most particularly on computer intrusions and network attacks. Computer intrusions are becoming more commonplace, more dangerous and more sophisticated. Our nation’s critical infrastructure and our military’s command and control networks are most certainly being targeted by our enemies and other potential adversaries alike. Our companies are being targeted for insider information and our colleges and universities for their valuable research and development. All of that being said, cyber crime is hitting us at home as we are being targeted for fraud and identity theft and our children are often targeted by online predators. No one is immune to these cyber risks, individuals, countries, Fortune 500 companies and the neighborhood “Mom and Pop” store. These threats are evolving and expanding every day. It is important to be wary and safeguard information and cyber access by these fraudsters and predators. I am using the law enforcement perspective, one I am most familiar with, in this paper. Computer intrusions and network attacks can affect many different facets of national security and organizational information. It is clear that terrorists and their organizations are using the internet to recruit and maintain their strength. For example, in the Arabian Peninsula, Al Qaeda has produced a full-color, English language...

Words: 873 - Pages: 4

Premium Essay

Cybercrime

...Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨hme 3 o Richard Clayton 4 Michel J.G. van Eeten 5 Michael Levi 6 Tyler Moore 7 Stefan Savage 8 Abstract In this paper we present what we believe to be the first systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs – both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now ‘cyber’ because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/Euros/dollars a year; transitional frauds cost a few pounds/Euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be...

Words: 16972 - Pages: 68

Free Essay

Cybercrime

...Baggili & Rogers - Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 550–565 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity Ibrahim Baggili 1 Zayed University, United Arab Emirates (UAE) Marcus Rogers 2 Purdue University, West Lafayette, USA Abstract A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants...

Words: 6388 - Pages: 26

Premium Essay

Cybercrime

...open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively protecting the availability, integrity and confidentiality of University of Dar es Salaam Information Systems. Chapter One Introduction 1. Introduction Cybercrime is one of the fast growing areas of crime. Accordingly, there have been increased...

Words: 7435 - Pages: 30