Free Essay

Computer Crime: Pornography, Fraud, Hacking and Gambling

In: Computers and Technology

Submitted By MalikStrowhorn
Words 4504
Pages 19
Chapter 22

COMPUTER CRIME: PORNOGRAPHY, FRAUD, HACKING AND GAMBLING

CHAPTER SUMMARY

The Internet, a relatively recent phenomenon, has caused a change in how laws may or may not apply to formerly traditional situations. Furthermore, the Internet has allowed criminals to perpetrate crimes that could not exist but for cyberspace. Chapter 22 examines computer crime and the statutes enacted to combat this growing problem as well as the erosion of our personal privacy. Freedom of speech, online gambling and cybermedicine issues are also examined in light of contemporary applications and influences resulting from the Internet.

CHAPTER OUTLINE

I. COMPUTER CRIME AND CYBERCRIME

A. Definitions

1. Computer crime consists of crimes involving: • Computers • Computer systems • Computer applications. 2. Cybercrime consists of computer crime that takes place in cyberspace 3. The Internet facilitates a number of opportunities for crimes to occur. 4. Typical cybercrime abuses include: • Hacking • Spreading of viruses • Fraud • IP theft • Appropriation of trade secrets • Defamation

B. The USA Patriot Act, 2001

1. The USA Patriot Act provided significant new powers to federal law enforcement agencies. 2. In conjunction with the Patriot Act, an executive order issued by President Bush expanded the power of federal investigators. 3. The Patriot Act and executive order strengthened the federal powers relating to: • Computer and cyberspace communication • Storage of electronic records 4. The U.S. Department of Justice, reacting to the increase in computer and cybercrime, formed a special Computer Crime and Intellectual Property Section (CCIPS) unit. 5. See the Cyberlaw Developments box on page 710.

C. Particular Challenges to Cybercrime Fighting

1. The U.S. does not have jurisdictional authority to dictate to enforce its laws in other countries. 2. Illegal acts which are impossible to regulate can occur on the Internet. 3. Examples include: • The proliferation of pornography and its easy access to children • On-line gambling 4. Conflicting jurisdictional issues are difficult to resolve, particularly if the conflict is of an international nature. • Extradition of criminals is a complicated process that is not consistently adhered to • Sharing of criminal files and investigatory information often runs into severe barriers.

II. PORNOGRAPHY AND OBSCENITY

A. Pornography

1. Pornography consists of sexually oriented materials that are constitutionally protected as free speech regarding adults. • Making pornography available to children is a criminal act 2. Obscenity consists of sexually oriented materials that are not constitutionally protected regarding anyone. 3. Examples of obscenity include: • Sexual materials containing images of children • Extremely bizarre images of sexual conduct 3. The Internet pornography industry is a huge business. • Americans alone spent $970 million on adult sites in 1998 • Pornography accounted for approximately 8% of the approximately $18 billion e-commerce trade in 1999 • More was spent on online pornography in 1999 than on all online book purchases • More was spent on online pornography in 1999 than on airline tickets

B. Constitutional Protection for Freedom of Expression

1. The first amendment is simple and direct saying that “Congress shall make no law…abridging freedom of speech”. 2. Nevertheless, significant limitations on speech have been created, including restrictions pertaining to: • Fraud • Copyright infringement • Defamation • Fighting words • Obscenity 3. Abridgements of speech, to be constitutionally permissible must: • Promote a compelling state or government interest • Actually promote the state or government interest • Must not be overly broad 4. Refer back to the Freedom of Speech discussion in Chapter 5.

C. Children and Adult Materials

1. Statutes designed to limit access of adult materials to children have been deemed constitutional. 2. Sexual material involving children creates criminal liability regarding adult participants. 3. Raw language may not be regulated, but the sale or viewing of materials containing raw language can be restricted to adults. 4. The determination of pornography and determining permissible child access is a constantly changing issue due to changes in societal mores.

Teaching Tip: This changing societal view also pertains to geographic location. Books that this author was required to read in high school were banned to his children when they reached high school in a different state.

D. Legal Definition of Obscenity

1. The Supreme Court definition of obscenity is a three prong test asking: • Whether the average person, applying contemporary community standards, would find the work, taken as a whole, appeals to the prurient interest • Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by applicable state law • Whether the work taken as a whole, lacks serious literary, artistic, political or scientific value

Teaching Tip: An important concept to stress is that the standards require that an average person apply contemporary community standards. This means that no one person or group may dictate the application of the law for the entire community. It also means that what is deemed obscene in one community may not be deemed obscene in another.

E. Reasonable Restrictions Based on Time, Place or Manner

1. Reasonable restrictions as to time, place and manner of freedom of expression has been permitted by the courts. 2. Such restrictions include: • Rating systems creating X, R, N17, PG and G labels and enforcing age requirements to view movies are legal • Over 18 restricted sales of explicit CDs are legal • Laws in general that restrict children’s access to adult materials 3. See the NUTZ and BOLTZ box on page 718.

F. Communications Decency Act (CDA) of 1996

1. The CDA attempted to make it illegal to: • To transmit, in interstate commerce, comments, requests, suggestions, proposals, images or any other communication which is obscene , knowing that the recipient is under 18 years old • Knowingly permit any telecommunications facility under one’s control to be used for any activity mentioned above 2. Large parts of the CDA, pursuant to the decision in Reno v. American Civil Liberties Union, were declared unconstitutional. • The CDA was deemed to be creating an undue burden on adult speech

G. Other Attempts to Censor the Internet

1. Parts of the CDA remained valid and the issue remains as to whether the government could control websites that initiate contact with minors for the transmission of improper material.

H. Child Online Protection Act (COPA) of 1998

1. COPA attempts to require that website owners use bona fide methods of identifying visitors to their websites if the website offers materials deemed to be harmful to minors. 2. COPA has been challenged by the American Civil Liberties Union and an injunction has been issued prohibiting the government from enforcing COPA. 3. The matter is currently under appeal

I. Child Pornography Prevention Act (CPPA) of 1996

1. CPPA makes illegal the use of computer technology to produce materials that contain portrayals of real children involved in sexual activity, as well as virtual or fictitious children. 2. Litigation regarding CPPA has resulted in the following: • It is constitutional to prohibit pornography that makes use of real children • It is not constitutional to prohibit pornography that makes use of virtual or digital images that do not use real children

Teaching Tip: Defining pornography and obscenity is not an exact science. This uncertainty is at the heart of a statement made by Supreme Court Justice William Powell when he said, “I can’t define obscenity, but I know it when I see it.” (Paraphrased)

III. CYBERSTALKING

A. Cyberstalking is the use of electronic or technical means to stalk another person

1. Cyberstalking may involve: • The internet • E-mail • Any other electronic device 2. Cyberstalking requires: • Harassing or threatening behavior • Some sort of credible threat 3. See the Cyberlaw Developments box on page 721.

IV. CYBERCRIME: FRAUD

A. Computer Antifraud and Antihacking Statutes

1. The Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 makes it illegal if a person: • Knowingly and with intent to defraud produces, uses or traffics in one or more counterfeit access devices • Knowingly and with intent to defraud traffics or uses one or more unauthorized access devices during any one year period and by such conduct obtains anything of value 2. An access device can be a/an: • Card • Plate • Code • Account number 3. Access devices are used to initiate transfers of funds. 4. Counterfeit devices are any device that is counterfeit, fictitious, altered or an identifiable component of an access device. 5. Examples of counterfeit devices include: • Credit cards obtained with an intent to defraud • Gaining access to cellular telephone services without paying 6. The Computer Fraud and Abuse Act of 1984 is directed at computer hackers. 7. Under the Computer Fraud and Abuse Act of 1984, it is a crime to knowingly access a computer without authorization or exceed authorization and obtain: • Information contained in a financial record of a financial institution or of a credit card issuer • Information contained in a file of a consumer reporting agency on a consumer • Information from any department or agency of the United States • Information from any protected computer if the conduct involves interstate or international communication 8. The Wire Fraud Act, as amended by the No Electronic Theft Act of 1997 requires that: • Defendants be involved in a scheme to defraud by false pretences • The defendant knowingly participated in the fraud • Interstate wire or mail communications were used to further the scheme 9. The No Electronic Theft Act (NET) amended the Wire Fraud Act by making it a felony to do the actions prohibited in the Wire Fraud Act whether or not the perpetrator realized or had an expectation of financial gain. • There must be a taking for a violation to be actionable 10. See the Cyberlaw Developments box on page 728.

B. USA Patriot Act

1. The USA Patriot Act amended a number of existing statutes to allow federal criminal investigators: • Wider availability for the use of wiretaps • Easier access to stored wire communications such as voice mail • Expanded scope of subpoena authority regarding electronic evidence • The use of tracking devices on computer networks • The ability to intercept communications of computer hackers 2. Sentences were increased for hackers from 10 to 20 years. 3. See the Ethical Challenges box on page 725.

C. Other Computer-Related Antifraud Statutes

1. The Identity Theft and Assumption Deterrence Act of 1988 makes it a crime to knowingly transfer or use another person’s identity with the intent to commit, aid or abet any unlawful activity that constitutes a violation of federal law or a felony under state or local law.

Teaching Tip: In order to protect consumers against identity theft more than half of the states have passed laws requiring companies to display only the last four digits of credit card numbers hiding and not disclosing the rest whenever purchases are made.

2. The Electronic Communications Privacy Act (ECPA) of 1986 makes the unauthorized interception or disclosure of wire, oral and/or electronic communications illegal. 3. Among the things the ECPA pertains to are: • E-mail • Computer generated transmissions • Cell phone conversations 4. It is a violation of the ECPA to: • Intentionally intercept or inducing another person to intercept any wire, oral or electronic communication • Intentionally using or disclosing or attempting to use or disclose any wire, oral or electronic communication, knowing or having reason to know that the information was improperly intercepted in violation of the EPCA 5. ISPs fall under this act and are prohibited from intercepting using or disclosing information. 6. Exceptions to the ECPA include: • The operator of a switchboard (including ISPs) can intercept electronic communications in the normal course of business which is necessary to render the service or protect the rights or property of the service • In the ordinary course of business, employers may intercept phone calls as well as e-mail • Interceptions are appropriate if the sender or recipient of the message has consented to the interception • Law enforcement agencies conducting investigations may compel ISPs or other service providers to intercept communications 7. Title II of the ECPA applies to stored communications and makes it a crime to: • Intentionally access without authorization, a facility through which electronic communications are provided • Intentionally exceed authorization to access that facility and obtain, alter or prevent authorized access to a wire, or electronic communication while in storage

V. PROTECTION OF INTELLECTUAL PROPERTY

A. The Economic Espionage Act (EEA) of 1996

1. The EEA makes the misappropriation of trade secrets, using computers or by other means, a crime. 2. Penalties for violation of the EEA include: • Imprisonment up to 15 years • Fines up to $10 million • Forfeiture of property, profit or proceeds gained through the illegal activity • Misappropriation of trade secrets on behalf of foreign governments is considered a much more serious crime than if appropriated for U.S. firms

B. Criminal Infringement of a Copyright

1. Most copyright violations involve civil actions and damages. 2. Criminal sanctions are available when a person willfully infringes on a copyright either: • For purposes of commercial advantage or private financial gain • By reproducing or distributing one or more copyrighted works that have a retail value of more than $1,000 within a one year period

C. Digital Millennium Copyright Act (DMCA) of 1998

1. The DMCA was enacted to deal with hacker created software created to circumvent protections, such as content scrambling system (CSS) programs for copyrighted works. 2. Penalties for the violation of the DMCA include: • Up to $500,00 for the first offense • Up to five years in prison for the first offense • Up to $1 million for subsequent offenses • Up to ten years in prison for subsequent offenses

VI. INTERNET GAMBLING

A. Licensed Gambling

1. 48 states have some type of legalized gambling. 2. Gambling may take a variety of forms including: • Full service casinos • Limited casinos (slot machines only) • Horse racing • State lotteries

B. Unlicensed Gambling

1. Internet gambling sites are generally illegal. • Most are unlicensed • Most are located in foreign jurisdictions 2. The U.S. has essentially no authority to regulate foreign websites.

C. State enforcement of Gambling Debts

1. The Issue: Can a state enforce a gambling debt in a state where gambling is illegal? • If the gambling contract is illegal, states will generally consider the debt unenforceable and hence unrecoverable. 2. There is current mo federal legislation outlawing Internet gambling.

VII. CYBERMEDICINE AND INTERNET PHARMACIES

A. Cybermedicine

1. Cybermedicine is the practice of medicine over the Internet where: • The doctor and patient are physically separated • Communication is electronic 2. Generally, questionnaires are completed and medicine is dispensed pursuant to the answers. 3, Drugs then become readily available without the required prescriptions. 4. Two significant issues must be addressed: • Does the practice of Cybermedicine violate the rules of state boards? • Can a website legally sell prescription drugs? 5. Since teleconferencing is a recognized and approved practice, face-to-face meetings are not necessarily required. 6. Filling prescriptions online is open to abuse. • There is no way to verify the veracity of the questionnaire answers • Offshore drug sellers make profits solely on sales so they have a vested interest in maximizing sales. Therefore the independent doctor is cut out so the customer is unprotected • Patient information is not protected and is subject to sale • Drugs are sold by offshore sites that are not FDA approved

Teaching Tip: A current concern is the proliferation of Canadian websites selling low cost drugs. The cheaper prices made available undercut U.S. pharmacies and have the potential to drive domestic prices higher.

ETHICAL SCENARIOS

1. Statutes designed to protect children from pornography have frequently been struck down, either all or in part, when those statutes were deemed to be so broad as to limit adult rights to freedom of expression. How should society balance the rights of adults with the need to protect children? Should the government be in the business of protecting children or is that solely a parental job? How would society be affected if the government took a totally laissez-faire approach to pornography and child protection?

2. On pages 734 and 735, the book describes a gambling contract issue regarding a Ms. Haines. Do you agree that the banks and credit card companies should bear the burden of her losses? The bank and credit card company losses, once accumulated will likely be passed on to other customers. If the credit card issuers, to protect themselves, instituted policies regarding review of card use prior to the approval of each extension of credit, would that constitute, in your opinion, a permissible invasion of cardholders privacy?

3. Computer viruses can cause havoc when the infection hinders or disables personal or business computers. Naturally, the cost of dealing with viruses impacts major companies whenever an infection occurs and is high in both monetary and manpower expenditures, but even the small businessperson or casual user can be caused major inconvenience, anguish and expense when infected. Does the law deal with those who spread viruses severely enough? Is there anything more that the government could do to protect citizens and businesses that use the Internet that would not be viewed as an invasion of citizen’s rights? Now imagine that the next time you went to your personal computer it was useless due to a virus and had to be replaced; or, that the next time you went to the computer lab on campus you found that a virus had disabled all computers on your campus for six months. Would your answer be different?

SUGGESTED ANSWERS TO CASE QUESTIONS FOR ANALYSIS

Case 22-1
United States of America, Plaintiff-Appellee v. Robert Alan Thomas and Carleen Thomas, Defendants-Appellants

1. Based on the opinion in this case, is it fair to contend that the legal definition of what is obscene varies from community to community? Why did the defendants argue that the government was suing them in the wrong venue? Why would it be to the advantage of the defendants to have a different venue for this case?
Answer: Yes, the legal definition of obscenity varies from community to community and this was affirmed by this court. The court makes numerous references to the varying standards such as (1) “…juries are properly instructed to apply the community standards of the geographic area where the material was sent”, and (2) “The court recognizes that distributors of allegedly obscene materials may be subject to the standards of the varying communities where they transmit their materials…” The defendants claimed that the proper venue would be their home state rather than Tennessee. This was not persuasive because it is well established that “there is no constitutional impediment to the governments power to prosecute pornography dealers in any district into which the material is sent.” Obscenity and pornography are viewed differently from state to state and the defendant’s home state is much more liberal than Tennessee.

2. Do the community standards that are present in rural Western Tennessee determine what is “obscene,” and thus illegal, in more liberal areas of the country such as California? Why was the court not troubled by this prospect? How could the defendants in this case have easily avoided jurisdiction of the courts in Western Tennessee?
Answer: No, Western Tennessee obscenity standards apply only to Western Tennessee. No local community may impose its own standards on a second viable community. The court was not bothered by jurisdictional questions because it is well established that “there is no constitutional impediment to the governments power to prosecute pornography dealers in any district into which the material is sent.” The defendants could have avoided Western Tennessee jurisdiction by not selling memberships to Western Tennessee residents.

Case 22-2

United Stated, Appellee v. Richard W. Czubinski, Defendant-Appellant

1. What additional facts would have to be proven in order for the government to convict Czubinski of a violation of the Computer Fraud and Abuse Act?
Answer: The government would have to prove that the defendant willfully participated in a criminal scheme to defraud the plaintiff. The government would also need to prove that the defendant intended, by his actions, to deprive the government of their protected right.

2. If the defendant, Czubinski, had sold embarrassing information about the tax forms of celebrities, would he have violated the Computer Fraud and Abuse Act?
Answer: If he had defrauded the government by accessing and using the information for personal gain, a violation of the Computer Fraud and Abuse Act would occur.

3. Is any use of the Internet or computers that are connected to the Internet a “use of interstate wire communications in furtherance of the scheme,” which is the required second element of a violation? The court did not answer that question because the government’s case failed on the first required element, but what do you think?
Answer: Student answers will vary. However, the court did indicate that the mere unauthorized browsing, even if done with intent to deceive the government, did not rise to the level of deprivation pursuant to the federal fraud statutes.

Case 22-3
State of Minnesota by its Attorney General Hubert H. Humphrey III, Respondent vs. Granite Gate Resorts, Inc., d/b/a On Ramp Internet Computer Services; et al., Appellants

1. Does this case support the proposition that, if you establish a website that is accessible in a state, that state can exert jurisdiction over you and your website?
Answer: Here, the advertising and establishing of channels for customer advice, evidences intent to serve the market in Minnesota. This case determined that if the website is accessible in a state, at least minimal contacts are considered established and the state may exercise jurisdiction. The facts that at least 248 Minnesota based computers accessed and received transmissions from the site in a two week period, computers located in Minnesota were among the 500 computers that most frequently accessed the site, persons from Minnesota called the numbers advertised on the site and the defendants mailing list contained at least one Minnesota resident, solidified the fact that required minimal contacts had been established.

2. What was unfair and deceptive about the WagerNet website? Do you think that when a website says that, if you have a claim against it, you have to go before courts in Belize, but if they have a claim against you, they can sue you in your home state court is unfair?
Answer: The deceptive statement contained on the website was the declaration that gambling on the Internet was legal. This statement was untrue and designed to mislead readers and subscribers to the site. Student answers will vary regarding the jurisdiction portion of the question. Students should be encouraged to review the Chapter 2 discussions on jurisdiction. Although the international nature of this forum selection creates complications, the fact that the defendant corporation is domiciled in Nevada would likely allow a forum non conveniens motion to be successful.

3. Do you think rulings like the one that occurred in this case will drive all Internet gambling to offshore websites?
Answer: Student answers will vary.

SUGGESTED ANSWERS TO QUESTIONS FOR REVIEW AND ANALYSIS

1. There is a lot of activity on the Internet that is criminal. Discuss how privacy rights, jurisdiction, and free speech are being used to shelter criminal activity. Should we give up some of these rights to apprehend and punish cybercriminals?
Answer: Very often, criminals use constitutional and statutorily guaranteed freedoms to shelter criminal activity. Privacy rights allow lawbreakers to communicate freely with government intervention severely limited by statute. Although the government can and will monitor telephone, e-mail and other forms of communications, their right to so monitor is limited to circumstances in which reasonable evidence exists that criminal activity is taking place. The Internet has made jurisdictional issues difficult to resolve. Courts can exercise jurisdiction over U.S. companies doing business over the Internet as long as minimal contacts can be shown in the state bringing the suit. When the website is a foreign company located in a foreign country, jurisdiction and enforcement is almost impossible. Freedom of speech is one of America’s most valued freedoms. Any attempt to extinguish or even limit a portion of speech is very closely scrutinized. For example, despite the beneficial nature of child pornography banning statutes, the statutes are frequently struck down as unconstitutional when the language is so broad as to also limit adult speech. Student answers will vary regarding the issue of forfeiting rights.

2. Much of the legislation designed to reduce access to pornography by minors has been declared unconstitutional. What are the main reasons courts have relied on in declaring antiporn laws unconstitutional?
Answer: The courts have agreed with the ACLU saying that the statutes addressing child pornography place an undue burden and improper limitation of adult speech due to the broad language used in the statutes.

3. At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military. What are the current potential criminal risks associated with hacking illegally into computer systems?
Answer: Since the term hacker refers to anyone gaining unauthorized access to another’s computer, there are a variety of statutes that deal with and provide for punishment of convicted hackers. The Computer Fraud and Abuse Act was specifically enacted to deal directly with hackers regarding government and financial institution computers and was strengthened by the USA Patriot Act. The Identity Theft and Assumption Deterrence Act, the Electronic Communications Privacy Act, the Economic Espionage Act and the Digital Millennium Copyright Act may all involve unauthorized access to computers and thereby involve hacking. Each of these acts prescribes civil and or criminal penalties including monetary damages, disgorgement of profits gained, fines and imprisonment.

4 Criminal law statutes now protect your name and identity, your communications, and your ideas. Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated.
Answer: The Identity Theft and Assumption Deterrence Act was enacted to protect your name and identity by making it illegal to knowingly transfer or use another person’s identity with the intent to commit, aid or abet any unlawful activity that constitutes a violation of federal law or a felony under state or local law. The Electronic Communications Privacy Act makes the unauthorized interception or disclosure of wire, oral and/or electronic communications illegal regarding E-mail, computer generated transmissions and cell phone conversations. Your ideas are protected by the Digital Millennium Copyright Act which was enacted to deal with hacker created software created to circumvent protections, such as content scrambling system (CSS) programs for copyrighted works and the Economic Espionage Act which makes the misappropriation of trade secrets, using computers or by other means, a crime.

5. Online gambling and the purchase of pharmaceutical drugs over the Internet are quasi-legal activities that can only take place because the Internet allows the parties offering gambling and drugs access to those who want to be customers. Should law enforcement in the Unite States tolerate such activity of should it go after small nations that private shelter for such websites? In addition to policing the physical word, should the United States police all of cyberspace?
Answer: Student answers will vary. It may be interesting to see if the students think that such regulation could even exist.

Similar Documents

Free Essay

Cyber Crime

...CYBER CRIME Presented by : GROUP 3 CONTENT • • • • • • • • • • Introduction History of cyber crime Definition Categories of cyber crime Types of cyber crime Cybercrime statistics Cyber Threat Evolution Cyber crime in Philippines Safety tips Conclusion WHAT DO YOU KNOW? INTRODUCTION • Cybercrime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. INTRODUCTION • Examples of cybercrime in which the computer or network is a TOOL of the criminal activity - Spamming and - Criminal copyright crimes, particularly those facilitated through peer-to-peer networks. INTRODUCTION • Examples of cybercrime in which the computer or network is a TARGET of criminal activity • - Unauthorized access (i.e, defeating access controls), • - malicious code, and denial-of-service attacks. INTRODUCTION • Examples of cybercrime in which the computer or network is a PLACE of criminal activity - theft of service (in particular, telecom fraud) and - certain financial frauds. BRIEF HISTORY • The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. DEFINITION • Cyber Crime is a Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer...

Words: 1366 - Pages: 6

Premium Essay

Cj Assigment

...Forensics Chapter 1 Review 1/6/2015 Practical Exercise: Child pornography is a crime how has not been mentioned in this chapter. This crime falls under the second category because the computer is being used as a tool to commit a crime. They use the computers to sell illegal content over the internet. Critical Thinking: Sex trafficking is a major issue. Review Questions: 1. Cybercrime is the use of computers and other like technologies to commit crimes. 2. Cybercrime: All digital crimes. Traditional Crime: All non-digital crimes. 3. a. Fraud – this can now be accomplished from your computer by hacking emails and other people’s computers and getting innocent peoples personal information to steal and identity or money. b. Terrorism – Now with the advancement of computer hacking, hackers are able to access restricted networks and gain a wealth of top secret information from various governments around the world. c. Illegal Gambling – This went from playing in the back room at a Chinese Laundromat to being able to gamble illegally right from your home computer or cell phone. 4. d. Category one: Computer used as target of the crime. This includes: Hacking, botnetting, DoS/DDoS, or virsuses/Trojans/worms. e. Category two: Computer used as the tool to commit crime. This includes: Copyright infringement, phishing, cyberbullying of any kind, illegal gambling. 5. Hacking a website and holding it hostage from the original host, also...

Words: 397 - Pages: 2

Premium Essay

Causes And Disadvantages Of Cybercrime

...been describe on several well-known of organized cybercrime committed internationally which are, internet fraud, anonymity through technology, a market in confidential information and forgery and counterfeiting. Internet has a powerful ability as it can rapidly reach across the world so it provides a larger potential aimed victims than any medium for fraudster operating such as telephone, email or personal contact. Nowadays, criminals can forge not only currency but also credit card details and identification documents such as university certification and birth certificates with great quality and accuracy as the original one. Nigel (2007) has a similar view related to types of cybercrime but focusing of financial crime and fraud in the cyberspace. He explained further on financial crime as it includes problems such as money laundering, terrorist financing and financial fraud. Financial fraud defined by (Stewart, 2001) is where a criminal gains a financial advantage through a false pretence....

Words: 1408 - Pages: 6

Premium Essay

Anthony

...Categories of Computer Crime CIS 170 Information Technology in Criminal Justice Dr. Johnson Strayer University February 5, 2014 The four common categories of computer crimes are: Computer as a target, Computers as an instrument crime, Computers as an incidental to a crime and Computers associated with the common occurrence of a computer. Cybercrime is criminal activity or crimes committed over the internet, through a computer system or though technology. Cybercrimes is also highly known around the world. Also these computer crimes are not authorized by the victim The four common categories of computer crimes are: 1. Computer as a target – Crimes in which the computer is the target in theft, intellectual property, theft of marketing information and blackmail from information gathered from another computer. Other things such as hacking into businesses, government or state information and creating false identities, stealing information or destroying their files which causes havoc. 2. Computers as an instrument of a crime – This doesn’t refer to stealing information rather it is the lawful possession of the item to infiltrate committing the crime. In this case it is the computer that is being used. 3. Computers as an incidental to a crime – The computer isn’t the direct crime being committed however, it is used to make the crime occur faster and to gather the information more quickly, this method makes it harder to trace. These crimes include money laundering...

Words: 1427 - Pages: 6

Free Essay

Itinfo Security Law and Ethics Course Syllabus

... In addition, students examine ethical issues, forensics, and evidence of cyber-crime. (No Prerequisite) |   | | Terminal Course Objectives | DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives (TCOs). The TCOs define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes. A | Given the importance of Law, Investigation, and Ethics in Computer Security, develop an understanding of the operation of the American legal system, including how the interpretation of statutes, judicial precedents, and legal reasoning affect information security. | B | Given the global nature of the Internet, evaluate how doing business on the Internet may subject you and your company to the laws, regulatory agencies, and judicial systems of multiple states and/or foreign countries. | C | Given that the Internet is owned by no one, consider how information security is affected by governmental regulation, specifically, privacy laws, taxation, assignment of Internet addresses, and the regulation of pornography and gambling. | D | Given the value of information, explain...

Words: 891 - Pages: 4

Premium Essay

Cybercrime

...usage of the Internet and the access of personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi.com). According to the Cyber snitch Voluntary Online Crime Reporting System, the most reported Internet related crime is child pornography, with other crimes ranging from desktop forgery to such potentially violent crimes as electronic stalking and terrorist threats. (Cybersnitch...

Words: 2360 - Pages: 10

Premium Essay

No Paper

...CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations that would help in checking the increasing rate of cyber-crimes and...

Words: 2267 - Pages: 10

Free Essay

Paul

...COMPUTER CRIMES A Case Study submitted in partial fulfilment of the requirements for the completion of the course in CIS401M: IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime...

Words: 7997 - Pages: 32

Free Essay

Cyber Crime- Online Predators

...Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators 2 I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against...

Words: 2467 - Pages: 10

Free Essay

Computer Crime

...COMPUTER CRIME OUTLINE SUBSTANTIVE COMPUTER CRIMES I. Intro A. Categories of Substantive Computer Crime Law 1. computer misuse crimes = intentional interference w/proper functioning of computers (hackers, viruses) 2. traditional crimes = traditional criminal offenses facilitated by computers (gambling, pornography) B. Computer Crime v. Traditional 1. computer crime usually threatens economic interests more than physical 2. computer crime much more likely to cross state boundaries; most traditional crime is dealt with by the states II. COMPUTER MISUSE CRIMES A. 2 ways they can occur 1. user exceeds his own privileges a. “insider”: has some privileges/rights 2. user denies privileges to others b. may be an “outsider”: no access rights B. Most Common Statutes 1. unauthorized access statutes 2. computer fraud statutes 3. computer damage statutes C. Why Punish? 1. utilitarian: deterrence of harmful conduct, incapacitation, rehabilitation (looks forward) 2. retribution: just deserts; restore moral order (looks back) D. The Hacker Ethic: an open and free approach to using and exploring computers; any computer user has the right to tinker with and improve any computer; rules governing access should NOT be followed 1. misuse can improve security E. How or When to Punish 1. Property-based view: the computer is not yours, so if you break in you should be...

Words: 16552 - Pages: 67

Premium Essay

Efefe

...I PRELIMINARY PROVISIONS SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″. SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation. SEC. 3. Definition of Terms. — For...

Words: 5454 - Pages: 22

Free Essay

Cybercrime

...Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center Introduction The capabilities and opportunities provided by the Internet have transformed many legitimate business activities, augmenting the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. Criminals have also discovered that the Internet can provide new opportunities and multiplier benefits for illicit business. The dark side of the Internet involves not only fraud and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of disruption that is the focus of the intruder community. In the virtual world, as in the real world, most criminal activities are initiated by individuals or small groups and can best be understood as “disorganized crime.” Yet there is growing evidence that organized crime groups or mafias are exploiting the new opportunities offered by the Internet. Organized crime and cyber-crime will never be synonymous – most organized crime will continue to operate in the real world rather than the cyber-world and most cyber-crime will continue to be the result of individuals rather than criminal organizations per se. Nevertheless, the degree of overlap between the two phenomena is likely to increase considerably in the next few years. This is something that needs to be recognized by business...

Words: 3403 - Pages: 14

Free Essay

Issues in Ecommerce

...development of network technologies began electronic commerce as a global trend. E – Commerce utilizes electronic systems for not only buying and selling of the goods and services but also in marketing, supply management, fund transfer. Today most of the businesses rely on electronic systems at least at some points. World Wide Web, the resultant of Internetworking is the main contributor where telephone, mobile phone, fax also serve the purpose. Even though e-commerce technologies provide great benefits, any kind of online transaction give potential for immense misuse of these technologies. Several organizations become the target of e-commerce related crimes ranging from virus assault to business frauds, including e-mail theft, stealing sensitive data of person and credit card information. U.S government’s new internet fraud center does a survey that gathers and studies consumer complaints. Online auctions make nearly 50% of the complaints obtained by the center. Other major types of complaints are security and commodities complaints 16.7%, credit card complaints 4.8%, identity thefts generate 2.9% of the complaints, loss of business chances 2.5% and professional service related complaints 1.2 %( Hossein Bidgoli, 2002). The issues of technology security vulnerabilities are not only limited to e-commerce, but also is the part of much obvious issue affecting information systems all around the world. Generally, an E-Commerce environment includes front-end web pages, back-end databases...

Words: 3804 - Pages: 16

Premium Essay

European Union E-Commerce: Consumers Rights and Protection on the Internet

...EUROPEAN UNION E-COMMERCE: CONSUMERS RIGHTS AND PROTECTION ON THE INTERNET PICHAYAPONG PICHAYAPONGS U 3055471 CONTENTS I INTRODUCTION 3 II THE EUROPEAN DIRECTIVE OF 20 MAY 1997 CONCERNING DISTANCE CONTRACTS 3 A The distance contract 4 B Written confirmation 5 C Cooling-off period 5 D Tax payable on goods 5 E Credit card fraud 6 F Special protection 6 G Directive 97/7/EC of The European Parliament and of The Council of 20 May 1997 on the protection of consumers in respect of distance contracts 7 III SECURITY AND CONFIDENCE ON THE WEB 7 A Asymmetrical cryptography 8 B Electronic payments 9 1 Europe Adopts Legislation to Expedite E-payments 9 C The labelling of websites 9 IV GOVERNMENT REGULATION 10 V CONCLUSION & RECOMMENDATION 10 VI REFERENCE 11 I INTRODUCTION In the past decade, the boom of the internet in Europe and the emergence of e-commerce has led to a broader of the commercial offers that can be proposed to the consumers. Indeed, an expansion in internet offering come the demand for online security regarding the rights and interests of the internet users and also the development of the internet implies a certain number of adaptations to efficiently protect the consumer. In Europe, a person considered as a consumer is protected by the consumer rights.[1] As texts and laws directly dealing with e-commerce are very uncommon, on 20th May 1997 the European Parliament and the Council adopted Directive 97/7/EC regarding...

Words: 2909 - Pages: 12

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818