Free Essay

The Dangers of the Internet

In:

Submitted By unimind
Words 1217
Pages 5
The Internet is praised as a modern technological break through, pushing human communication and productivity to unbelievable heights. With the benefits and excitement of the Internet constantly publicized however, the inherent disadvantages brought forth with this technology are dangerously overlooked, much to the advantage of the parties who are the source of these issues. With the necessary funding, governments can and have been known to conduct surveillance on their citizens via the Internet (Geer, 92-93). The Internet has also allowed nations to conduct espionage on each other, becoming a serious national security risk as a new platform over which warfare can be carried out has been created (Solis, 1-3). Although businesses can leverage the Internet to achieve an incredibly high degree of globalization, the integration of Internet technology into businesses has opened them up to financially driven cyber attacks, resulting in net losses of millions each year ("Cybercrime Becoming More Professional." 3). The globalization brought with the Internet is not selective; it is inherent. Gritzalis and Gurvirender argue that a massive underground economy has birthed where criminals are achieving new levels of sophistication and organization, optimizing their gains and deepening the losses of society (1-2). This paper will explore the argument proposed by Gritzalis and Gurvirender.

Criminals who have adapted to the cybercrime market are becoming increasingly complex in their methods. The rise of virtual marketplaces for illegal goods and services has proved effective in thwarting law enforcement agencies (Tor Project, 2011). The underground economy can be broken down into two primary markets: illegal narcotics and hacking related products and services.

The growth of the narcotics marketplace has skyrocketed in the last few years, and especially in 2013. Silk Road, the most well documented virtual drug marketplace, was a thriving economy of between 30,000 and 150,000 active buyers and sellers from its birth in 2011 until its shutdown in 2013 by the FBI (Network Security 2013 1). Federal authorities have publicly stated that over $2 billion USD had circulated in the Silk Road marketplace over its short lifespan of two years and half years, earning an alleged $80 million in commissions for its creator alone.

Silk Road was described as the “eBay of drugs”. Vendors created fixed-priced ads for their products while buyers shopped through the vast listings available. Like eBay, a reputation framework had been built into their market. Buyers can make better judgments on the sellers available by viewing their reputation score, which was calculated from the numerical feedback ratings of their previous sales (Network Security 2013 2). The narcotics listed on the Silk Road were organized into the following categories: ecstasy, cannabis, dissociatives, psychedelics, opioids, stimulants, benzodiazepines and other (Barratt 683)

The shutdown of the Silk Road did not put an end to the online drug market. This was simply seen as an opportunity for copycat and competitor marketplaces to replace this apex position. In order to use underground marketplaces like the Silk Road, a type of digital currency called “cryptocurrency” is required for transactions. Cryptocurrencies are mandatory in the underground economy because they have been designed to carry out monetary exchanges with anonymity (Bitcoin, 2011).

The second largest shareholder of the underground cybercriminal economy is the hacking marketplace. The sophistication of the hacking marketplace has been radically streamlined over recent years to a shocking degree (Geer 93-95). The largest subdivisions of this marketplace are stolen information and malicious software. Stolen information is typically sold in the form of credit card numbers, social security numbers, and bank account credentials. Malicious software, on the other hand, allows attackers to conduct information theft operations. Hackers who have technical knowledge produce software so people don’t have to understand the mechanics of the tool in order to use its function. An analogy to help understand this concept could be thought as a person driving a car. One does not need to be a mechanical engineer in order to drive a car.

Hacking related discussion boards and marketplaces are typically available on the Deep Web, where an apex degree of protection and anonymity is built into the framework to hide criminals from law enforcement agencies. Tor, a web browser invented by US Navy in 2002 to secure military and government communications, was recently released to the public and has become the most popular web browser among criminals.

But how is the use of such malicious tools converted into profit? Criminals purchase malware to steal information, such as credit card numbers, for the use of selling it in the underground marketplace to fuel fraud and identity theft related activities (Symantec 2014). The underground markets of stolen information and malware are therefore closely connected.

Previously, malware primarily targeted the data stored on household computers. Recently, however, an incredibly deadlier threat has surfaced. Criminals have innovated their algorithms to hijack the troves of information held by the systems of corporations, resulting in numerous high-profile data breaches of established enterprises such as Target, Sony, and Home Depot. In mid-December 2013, the data breach of Target had resulted in the theft of millions of credit and debit card numbers, which had shortly been dumped and circulated into the underground thereafter. This single data breach is estimated to have cost $148 million to Target shareholders (Target 2013). As with any economy, the underground economy operates by the laws of supply and demand. When high-profile data breaches such as Target occur, literally millions of credit card numbers and other confidential information get dumped into the underground in a short period of time, thereby lowering aggregate price of the product.

The primary issue with underground virtual marketplaces is that documentation is scarce because research in this area is still in its infancy stage. These underground economies have just begun to catch the attention of law enforcement agencies and academic researchers because of the sheer amount of popularity they have been garnishing. The breakthrough of dark net markets into mainstream media will certainly attract more research to be conducted in this field. Second, there’s an issue with measuring how much economic losses are incurred because of malware (particularly data breaches). Total losses from data breaches are especially difficult to quantify because the resources devoted to correcting these issues are spread throughout various parties such as financial institutions dealing with resulting fraud.

Works Cited

Wueest, Candid. "Underground Black Market: Thriving Trade in Stolen Data,
Malware, and Attack Services." Symantec Security Response. Symantec, 10 Dec. 2014. Web. 7 Mar. 2015. .

"Cybercrime Becoming More Professional." Computer Fraud & Security 2014.10
(2014): 3.

"Silk Road Online Drug Market Taken down." Network Security 2013.10 (2013): 1-2.

Barratt, M. J. (2012), SILK ROAD: EBAY FOR DRUGS. Addiction, 107: 683.

Bitcoin (2011). Bitcoin P2P digital currency. Retrieved 4, March 2015 from http://bitcoin.org Hout, Marie Claire Van, and Tim Bingham. "‘Surfing the Silk Road’: A Study of Users’
Experiences." International Journal of Drug Policy 24.6 (2015): 524-29. Print.

Gritzalis, Dimitris, and Gurvirender Tejay. "Cybercrime in the Digital Economy –
Editorial." Computers & Security 38 (2013): 1-2. Print.

"Data Breach FAQ." Payment Card Issue FAQ. Target, 1 Dec. 2013. Web. 7 Mar. 2015.
.

Geer, Daniel E. "Personal Data and Government Surveillance." IEEE Security &
Privacy 12.4 (2014): 90-96. Print.

SOLIS, GD. "CYBERWARFARE." Military Law Review 219 (2014): 1-52. Print.

Similar Documents

Premium Essay

Dangers

...Internet dangers The internet information is very large, so the peoples very it, because there are a lot of good uses for the internet, but the internet have a dangers. Today I am going to talk about the interne dangers. The internet dangers have very much, in here, I talk about the financial concerns, porn sites and privacy leak. Those dangers are relatively common. In the next, let me tell you how can be wary of those dangers and avoid them. In life, those dangers we can find in have children family, because those dangers often occurs in children. How can be wary of those dangers and avoid them? First talk about the financial concerns. In internet, will have very much people deceive others, why? Because they want money, so they are deceive other peoples. How to solve this problem? The parents can don’t give very much moneys to children, let they know the money how hard to earn, and then let the children tell you they how to use or intend to do to use the moneys in every times. Next about the porn sites. That danger will easy let the children learn bad, so the parents need care it. The parents can install software filters in children computers, the software filters can prevent the computer to open porn sites, but I know the software filters will have some nasty sites can slip through, so the parents records software, it can record the child open any website, the parents can check it. And then about the privacy leak, that is important one, because if the children leak some...

Words: 549 - Pages: 3

Premium Essay

Spyware

...supports his suggestion by listing the many dangers on the internet. Coben suggests that parents should install spyware on their child’s internet in order to keep them safe. The author writes in an informal tone for parents. Indeed, parents should monitor children closely online by using spyware because they can see if their child is in danger and they can help prevent their child getting in danger. Parents should monitor their children online because they can see if their child is in any kind of danger. For example, Coben states in his article “The Undercover Parent”, “One friend of mine, using spyware to monitor his college bound, straight-A daughter, found out that not only was she using drugs but she was sleeping with her dealer…. He decided to come clean, to let her know how he had found out, to speak with her about the dangers inherent in her behavior” (Coben, Paragraph 13). The example shows how a father used spyware to find out if his daughter was in danger, which she was in, the father then had a conversation with his daughter to tell her that the things she was doing online was very dangerous. The father prevented his daughter from getting into even more danger on the internet by using spyware. Since the father talked to his daughter, she wasn’t in any danger any more. Furthermore, Ellen Goodman in her article “Big Brother meets Big Mother” states, “but even if kids aren’t wandering in the neighborhood they are wondering in the internet with all of its unknown col-de-sacs…...

Words: 629 - Pages: 3

Free Essay

Information System Proposal

...Information Technology Act Paper Shirley Richardson BIS/220 July 7, 2013 David Martin Children’s Internet Protection Act, 2000 As the internet grows and become a vast part of how the world communicates. The world is bombarded with the existence of the dangers and threats, especially involving the younger generation. Because of the vast danger and threats, a great need for filtering software has become the center of attraction, world-wide concerning the debate about children, sex, and the internet. In December 2000, Congress passed the Children’s Internet Protection Act (CIPA), which is a law that places a demand on every school, library, museum, and all public related facilities to ensure there are some form of filtering application in place so, that they can continue receiving Federal funding for computers and internet accessibility. Entangled within the vast talked about dilemma of the internet and its dangers, as it pertains to children’s sexuality, internet filtering software takes up a wide spread of issues resulting in anxiety and fear. The matter that pose a major issue to parents are what the children are being exposed too, such as pornography, sexual images, sexual experience and sexual information, all of these things and more are discovered. The only way to protect the children from these obscenities and the dangers that the children are faced with, will be to educate our children, the responsibility does not fall on the distributors alone but the parents...

Words: 985 - Pages: 4

Premium Essay

Internet Dating, Yay or Nay.

...Ads by Google ► Internet Dating ► Dating Chat Rooms ► Phone Dating ► Children Stories Home Our Blog About Us Contact Us Search Welcome to the Dangers of Internet Dating The day has come when internet dating is considered a legitimate way of meeting new people in the endless search for the right person. Chat rooms have replaced bar rooms, and internet dating sites and personal ads no longer have the "stigma" that they once did. You may still get a raised eyebrow when telling people you are using the internet for your search for the perfect date, but no where close to the reaction you would have gotten years ago. Internet dating has gained popularity by leaps and bounds, and unfortunately, so have the dangers and horror stories some have encountered. The anonymity of internet dating has afforded con artists a new playground for scams, and has allowed people to be anyone they think you want them to be because they are engaging you primarily through the written word. This site is not meant to bring forth the message that its impossible to find love through internet dating, but to inform people of the dangers that are out there. Internet dating is still a relatively new way of people connecting with people from all over the globe, and people need to understand the dangers out there so they can make their search a safe one. Included in this site or stories from those that have been there, and are willing to share their experiences with others in an...

Words: 1563 - Pages: 7

Free Essay

Social Media Dangers

...Julia Brand English 101 September 11, 2014 Dangers of Social Media Social media has become a commonplace in the homes across America. Like all things there are those out there who looks to use things for bad purposes. This puts us in a predicament where our children have access to the entire world before they’re truly ready to experience it. This means we need to help teach our children what is and isn’t safe on the internet and for us as parents to also recognize what is harmful and to attempt to protect our children. The dangers they face are often cyber-stalking, cyber-bullying, and a “no privacy” zone. Being able to recognize these things and teach our children how to handle them will make for a much safer social media experience and an all-around more fun one. A threat to children that can lead to many harmful outcomes is cyber-stalking. This also includes harassment over the internet. Many times cyber-stalking is performed by a jealous ex-boyfriend/girlfriend who becomes obsessive and unable to move on from the relationship. Sometimes this can be an adult posing as a child in an attempt to lure them to their home. This is a particularly dangerous form of cyber-stalking that has very potentially dangers outcomes. Many times these people go years without being caught because they cause the victim to be in fear of telling what happened and they often times return to the abuse. Another form of cyber-stalking is where someone “for fun” repeatedly sends malicious content...

Words: 1060 - Pages: 5

Premium Essay

Danah Boyd's Complicated Chapter Summary

...the social lives of networked teens. boyd has focused most of her scholarly work on teens and social media. Notably, boyd is also noted by the lack of capitalization in her name intended to both “achieve balance” and take the focus off herself. This element shines through as boyd guides parents, instructors, and similarly involved individuals into the lives of teens using social media. The overarching concern of many adults, boyd proposes, are the “new dangers” that come with the technology. However, she will come to acknowledge that the concerns of the “new dangers” may not be as foreign as adults believe. Teens have always embarked on a journey for privacy and identity. boyd shows that the internet and social networking sites, in general, are mostly another vessel for this coming of age. Finally, the major highlights of this book do not come from boyd herself, but is more so expressed through the commentary of teens that shape this narrative. boyd divided this discussion into eight sections: identity, privacy, addiction, danger, bulling, inequality, literacy, and ended with “searching for a public of their own.” Each chapter was also accompanied by a leading question that was based on the chapter title. The book began with some...

Words: 1081 - Pages: 5

Free Essay

A Guide for the Internet?

...birthday. After the death of Megan, they found out it was the mother of her former friend who was behind this cyber bullying. Megan's Father, Ron Meir stated, "That's the biggest tragedy of this whole thing. An adult did this." Living in the 19th century, everything we do is revolved around the Internet. Nowadays more than 50% of people can’t go a few hours without going on the internet since they have developed smartphones that bring it right into the palm of our hands which makes it harder for parents to monitor their kid’s internet behaviors. Basically whatever you do is connected to the Internet, from talking on the phone, video chatting and texting. But most people do not realize that there are consequences, which relates to all of the above if not taken certain measures and precautions that would lessen the risk of such threats that might arise while using Internet. Don’t get me wrong, the Internet is a wonderful tool that benefits everyone but others who are the rotten apples in the bunch use it to take advantage of the innocent users online. In this paper, I will argue on why it is important to have certain knowledge and guidelines to follow to protect us from predators and dangers of the Social Networks. I remember being a kid and my parents would complain that I stayed too...

Words: 1520 - Pages: 7

Free Essay

Protecting Children Online

...will not cut it in today’s internet world. Protecting children online takes planning, coaching and internet rules setup to hopefully provide that barrier. Anybody can be anybody behind a computer. Providing this vital information to children could be the one thing that saves that child’s life. What is a sexual predator online? A sexual predator is better known as pedophile. We have all checked those websites to find out and to see if we have a sex offender living near our homes. How many people have actually checked out the websites children are visiting? The children today are more technological then their parents and the parents need to be aware of the dangers that lurk behind every computer. The most common means by which sexual predators contact children over the Internet is through chat rooms, instant messages and email. In fact, 89% of sexual solicitations were made in either chat rooms or instant messages and 1 in 5 youth (ages 10-17 years) has been sexually solicited online (JAMA, 2001). Considering that 25% of kids online participate in real time chat and 13 million use instant messaging, the risks of such children, either knowingly or unknowingly, interacting with a predator is alarming. (Sexual Predators Online) The internet is a playground for sexual predators and the children are the toys. Adults have the responsibility to educate, console and protect the children from these dangers that face them every day on the internet. Predators disguise themselves...

Words: 1216 - Pages: 5

Premium Essay

Disadvantages of Internet

...Nowadays, the Internet has been viewed as an ultimate resource by many people in order to gain the information they desire. It is also used for other various purposes such as to communicate with one another and shopping. The Internet has expanded to the point where one is able to access the Internet not only from computers, but cell phones, tables and iPods making it extremely accessible from any location. As always, there is the other side of the coin. The Internet is dangerous despite being beneficial to the people. People of all age can surf the Internet regardless of their gender, age, or races. Hence, the Internet can be dangerous towards the unawared children and adults. The Internet can be dangerous because people can encounter sexual online predators and lose social interaction skills. Besides these, cyber-bullying occurs and one’s reputation may be compromised. In addition, there are cases of cyber-stalking and the Internet might lead to revolution which increases the social coordination of the public. First and foremost, the Internet has been dangerous because people may encounter sexual online predators. An online predator is one who attempts to sexually exploit a person through the use of online services and the Internet. Anyone can be an online predator. Most young teens are being targeted by the online predators. According to Richard M. Goo’s “Stranger Danger and The Online Social Network” (2008), the number of online sexual predators has been increased due to...

Words: 2012 - Pages: 9

Free Essay

Social Media and Online Predators

...Social Media and Online Predators Although there are many benefits of using social media, there are also many dangers. One of those dangers is the vast number of sexual predators that lurk in the midst of the cyber-world. The internet is not such a friendly environment when it comes to online sexual predators. As more and more individuals gain access to social media networking sites, the easier it becomes for online predators to victimize them. According to Richard M. Guo, “an online sexual predator is someone who uses the internet to sexually exploit vulnerable individuals, typically under-aged youths” (“Stranger Danger and the Online Social Network”). Online predators use many ways to lurk in young individuals. One of those ways are by impersonating someone. For example, the predator would pose as a younger teenager to appeal to other young teenagers. Then they would follow up by striking up conversations with those young teenagers in hopes of building up a certain trust level which would lead to easy access for the predator to attack the young teen. Having access to victimize the individual can lead to many outcomes. Those outcomes includes date rape, kidnapping, and sex trafficking. The way the predator would go about committing one of those outcomes is by asking the teen to meet up somewhere as a friendly invite. In the end their intention would be to harm the teen. The predator can also the threaten or blackmail the teen into doing what they say to do....

Words: 478 - Pages: 2

Free Essay

To Snoop or Not to Snoop

...believe it is acceptable for parents to use whatever source they feel necessary to protect their children, including but not limited to Spyware to monitor computer use. To further support my views of protecting children on the internet, we will consider family values, current laws and age appropriate monitoring. In my opinion, judgments and views from outside sources should not penetrate the “Family Values” that are usually dictated by the Head of Household. In most cases Family Values are there to deter any risky behavior by minor children. While the Internet allow kids the freedom to make friends, play games and research homework with the click of a button, it can pose a potential danger as online predators, cyber bullies and scam artists share the same freedoms. While there is no easy solution, preventative measures can greatly reduce a child’s chances of becoming a victim. Given the potential dangers of children’s internet usage, see the following suggestions for addressing internet safety in the home. 1. Explain to your children the potential hazards of online sexual solicitation and the risks associated with internet communication with strangers. 2. Teach your child to avoid sending personally identifying information via the internet. Such as a real name, address, school, telephone number, photos or names of family members. 3. Install a firewall, privacy filtration software and an antivirus program. 4. Discourage children from downloading games and...

Words: 972 - Pages: 4

Premium Essay

Dangers Of Social Media Essay

...Society today has technology that would have blown the minds of people only 50 years ago. If you told a person from the 1960s that we would one day be able to engineer graphics on a screen that were lifelike and virtual reality headsets that could transport you into a new world of immersion, they likely wouldn’t have believed you. Even the tasks that our cellphones can perform might have baffled them. It is amazing to see how far we have come. However, the price that we have paid to get here is large. The dangers that come along with all of our newfound technology almost always relate back to the use of the internet. In 2000, the Children’s Internet Protection Act (CIPA) was implemented. This program allowed for schools to receive funding as long as they agreed to an E-rated program that would block specific websites and platforms. Initially, the program was a...

Words: 844 - Pages: 4

Premium Essay

Computer Security

...Procedure for Policy Development and Management All companies must have policies that safeguard critical business data and sensitive information. Therefore employees must have appropriate behavior in order to avert the cybercrime. Many of these policies are just adopted, but till many companies find it necessary to be tailored so that it is tailored to an organization security needs and most till need to be updated to reflect ever changing impact of the cyberspace transactions in everyday activities. Like all company document, cyberspace follows good design and various format in order to make the document not be vague and follow government policies on security design. These policies also need to be reviewed regularly to ensure that they conform to the business needs that are ever changing gin the business environment. The following are the major items involved in the cybercrime plan actions. 1. Establish security roles and responsibilities Establishing security roles and responsibility in a company is one step towards combating cybercrime. The policies should clearly define the separation of roles with responsibility depending on the system in place. This means that a system will be designed on role based control which might not be well utilized when the procedures and policies are not well defined. The extend of employees can go with a system should show how much they can access in the system and the policies should be maintained at minimum. This means that: The security...

Words: 2072 - Pages: 9

Premium Essay

The Harmful Effects Computers and the Internet

...and the Internet Robin Diaz Strayer University Abstract Computers along with the Internet have come a long way from their first uses in the military and by large corporations. Today, computers are an important part of modern life. More and more people are purchasing computers for use in the home. Whether they are surfing the web or managing their finances, computers have become a useful tool. Some parents are purchasing computers and using them as electronic babysitters for their children. They might not see the dangers of this behavior. Everyday children are becoming addicted to computers and the internet the same way a person becomes addicted to drugs. Parents have to take extra care of making sure that their children are safe on and from the computer and the Internet. There are so many dangers that face children in the virtual world. It’s up to the parents to keep the kids safe from those dangers. The Harmful Effects of Computers and the Internet Over the past few years, I have noticed just how dependent my whole family is on technology. Currently in my home we have four computers with internet access, two Microsoft X-Box 360s, a Sony Playstation 2 and a Playstation 3. As a wife and mother, I have to be concerned about what my family is being exposed to. I thought that as long as I spot checked what my children were doing, that they would be okay. I had mistakenly believed that my children would understand the rights and wrongs of the Internet. One day...

Words: 2690 - Pages: 11

Premium Essay

Engl101-1502a-08 Composition and Critical Thinking

... You must to learn to adapt to change when necessary. Cybersecurity is a standout among the most basic issues the United States of America confronts today. The dangers are genuine and the need is squeezing. In spite of the best plans of those included with past cyber legislative efforts, an administrative premise essentially won't work. It won't enhance security and may really lower it by giving a bogus level of solace and secures the private segment with obsolete regulations. The internet's element nature must be recognized and tended to by strategies that are similarly rapid. The effort of advancement is endless and still in work in progress. The United States of America faces huge cybersecurity dangers that endanger America's discriminating base, the flexibility that Americans exercise on the web, and the financial readability of United States of America organizations. The cybersecurity existing conditions is temperamental, particularly when considering the huge and developing extent of these dangers. To moderate these dangers, this paper gives a system to congressional activity that bridles the force of United States of America industry and inventiveness, while shielding the flexibility and security of individual natives. "Through dynamic and financially savvy arrangements, Congress can make the internet a more...

Words: 585 - Pages: 3