Free Essay

Crme

In: Other Topics

Submitted By davisl36
Words 1491
Pages 6
Assignment 1: Digital Computer Crime Information Technology in Criminal Justice Lashavia Davis Strayer University Professor Marina Stakic

February 4, 2015

Computer crimes refer to any crime that involves a computer and a network, where unauthorized use of the computers where it may or may not have played an instrumental part in committing the crime. Computer crimes have a broad range of potentially illegal activities. It may be divided into one of two types of categories, “crimes that target computer networks or devices directly, and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.’” Which we have four major categories that fit inside one of two types of categories; the computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer.

This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network intruders who primary focus is to alter critical data, are a ways a computer can be used as the target. One of the earliest cases of the computer being target took place when Robert Morris Jr, a computer science student who wrote a self-replicating, self-propagating program that infected an estimated 6,000 computer systems, that later became known as “The Morris Worm.”

Computers can be utilized as an instrument or tool to facilitate criminal activity which refers to the processes of the computer used to gain some other criminal objective. Such as theft where attacker is taking property with intent of permanent depriving the owner of their property or servicers. Theft of data and services includes theft of sensitive information, proprietary information, or other intellectual property that is stored on personal, government, or corporate computer systems. Hackers can also create fraud and now threats and harassment of individuals and companies. An example of the computer being used as an instrument of crime would be on March of 2007, Robert Soloway, also known as “The Spam King” was arrested on 35 charges of fraud, money laundering, and identity theft. Soloway’s activities involved “hijacking computers from unsuspecting customers and using them to disseminate Spam that advertised his fraudulent marketing services, sending tens of millions of Spam messages using the hijacked computers.
Computers are incidental to other crimes; merely the computer is not essential for the crime to occur but helps facilitate the offense. When this takes place the computers help the crime to occur faster and also permit processing of greater amounts of information within a shortest possible period of time, making the computer crime more difficult to identify and trace. Some examples of such crimes include money laundering, processing and distribution of pornographic information unlawful banking transactions, and encrypting or erasing data files and criminal records. One form of this crime taking place was in twenty-fourteen in Miami, Florida. Alvaro López Tardón, of Miami Beach, was sentenced to one hundred and fifty years in prison. Tardón was the head of an international narcotics trafficking and money laundering scam which distributed over 7,500 kilograms of South American cocaine in Madrid and laundered over $14,000,000 in narcotics proceeds in Miami.
A computer associated with prevalence of crimes is the presence of computers only. These crimes are occurring as a result of advancements of technology and use of computers. Some examples include violation of copyright of computer programs software, such as duplicated, packaged, and selling illegally, component theft, identity theft, counterfeiting, and any other peripherals. One form of this computer crime took place in Alaska, against “Amparo-Vazquez, aka Japhet Soto Santiago, aka Luis Angel Cortez, a citizen of the Dominican Republic formerly residing in Alaska” was sentenced to prison, Amparo-Vazquez conspiring to defraud the government, to use stolen identities to file income tax returns for the purpose of obtaining fraudulent income tax refunds, with stolen identities of more than 2,600 individuals.
Identity theft typically occurs when a cybercriminal successfully steals a person’s person identity and personal information. But it remains one of most common forms of digital crime. This type of crime is a gateway to other cybercrimes such as tax-refund fraud, credit-card fraud, loan fraud and other similar crimes. Some examples of identity theft’s purposes are: opening a line of credit purchasing goods or services, renting or buying a house or apartment and obtaining employment. Identity theft includes three general types of crimes, “unauthorized use or attempted use of an existing account, unauthorized use or attempted use of personal information to open a new account and misuse of personal information for a fraudulent purpose”.
When determine a cyber-terrorism that will present the greatest threat to the United States I would have said an attack on our infrastructure reliant. Since the united states “has identified itself as the most infrastructure reliant of any nation.” Which might be true because we significant depend on our national information system which includes eight area of “virtual national life support system: telecommunications, banking and finance, electrical power, oil and gas distribution and storage, water supply, transportation, emergency services, and government services.” Imagine if terroirs and foreign government could tap into our system it would possibly makes us as a country very indefensible against any threats we may come under. But most of all our country would not be able to function if we were to have a major shutdown, which explains why both former President George W Bush and Current President Barak Obama has developed a plan to protect the nation infrastructure system. President Obama created “The Cyber Space Policy Review”. In Which
“…The Federal Government shall work with critical infrastructure owners and operators and SLTT entities to take proactive steps to manage risk and strengthen the security and resilience of the Nation's critical infrastructure, considering all hazards that could have a debilitating impact on national security, economic stability, public health and safety, or any combination thereof. These efforts shall seek to reduce vulnerabilities, minimize consequences, identify and disrupt threats, and hasten response and recovery efforts related to critical infrastructure (Barak Obama.)”
Based on this finding I determined this area cyber terrorism can created a great and most significant threat at this present time to the United State of American. As computer technologies keeps growing, so does the crime and threats of cybercriminal’s and cyberterrorist. Which mean the governments, court system, and law enforcement has to shift over to protect Business and Individuals from the leading and expending word of Cybercrime and Cyberterrorism along with the daily task list as while. The roles and responsible the Department of Justice alongside law enforcement are organize into categories The U.S Attorney’s Office, Federal Bureau of Investigation Which have many division under them, significant to serve us to better. Under the Department of Justice a programs called Criminal Division’s Computer Crime and Intellectual Property Section was created to prosecuted violations of federal code covered by the computer fraud abuse act, which works under a sub united called CHIP Computer hacking and property. Who focus on prosecuting computer hacking, fraud and intellectual property cases. The federal Bureau of Investigation has many divisions working under them to help maintain cybercrime. There primary role is to capture the criminal behind the computer intrusion. Their primary role is to capture the criminal behind the computer intrusion, under a program called “InfraGardr” created to join the Department of Justice CCIPS and CHIP Programs, housed in the bureau’s cyber division to exchange information in collaboration in the fight against cybercrimes. While assisting the U.S Attorney Office whose primary goal is to representing the federal government in court to prosecuting federal suspects brought against cybercriminals.
The many efforts Law enforcement have had with bettering counteract of computer crimes, they should look into opening a real time portal from the time the criminal takes place to actual time that located and catch the crime being committed. Such as creating a device that can be put into a computer to detective programs running in the background and breach in the computer security system made from an outside network, that automatic transmit to the correct division to monitor the crime being committed, would be a great tool to close the gap on cybercrime to the law enforcement world.

References www.dictionary.com Eric J. Fritsch, John Liederbach & Robert Taylor Digital Crime and Digital Terrorism (3rd ed). www.FBI.gov www.IRS.gov www.lectlaw.com www.nw3c.com
www.whitehouse.gov

Similar Documents

Premium Essay

Outline and Assess Feminist Views of Crme and Deviance.

...Outline and assess Feminist views on crime and deviance. (50) Within Feminism itself there are many different approaches to crime and deviance including Liberalism, Radicalism and Post-modernism. Each of them believes that crime, or the lack of crime, is a result of the patriarchal dominance in society. Feminists believe that the patriarchy generates crime against women whilst discouraging deviancy amongst women. The official crime statistics show that men tend to commit more crime than women, and some Feminists would agree with this. One theory put forward is that this is because of the differential socialisation of males and females. Oakley argues that males are socialised to be aggressive, self-seeking and individualistic, which can therefore lead to them taking more risks and committing criminal acts. For example, if a boy is socialised into an aggressive role then he might express this through domestic violence against his partner when he is older. In the same way, a self-seeking male will do anything to satisfy his needs, which may explain male rape against women. Oakley states that females, however, are socialised into non-criminal norms and values that stress co-operation, tenderness and caring for others. This tells us that women are much less likely to commit crimes that would hurt another person, such as murder and rape, and this is reflected in the statistics. Moreover, Radical Feminist Heidensohn claims that most academics in the area of sociology and......

Words: 1146 - Pages: 5

Premium Essay

Crime and Deviancy and the Effects of the Labelling Theory ( 40 Marks )

...Grace Elliott / Sociology homework due Friday 4th March 2016 Item A The criminal law is thus not a reflection of custom, but a set of rules laid down by the state in the interests of the ruling class, and resulting from the conflicts arising in class structured societies; criminal behaviour is , then , the inevitable expression of class conflict resulting from the exploitative nature of economic relations. Criminality is simply not something that people have or don’t have; crime is not something some people do and others don’t. Crime is a matter of who can pin the label on whom and underlying this socio-political process is the structure of social relations determined by capitalism. Using material from item A and elsewhere asses the usefulness of the Marxist approaches to an understanding of crime and deviance (21 marks) Marxists essentially see crime and deviance as defined by the ruling class and used as a means of social control – if you don’t conform then you will be punished. Institutions such as the police, the justice system, prisons and schools, the family and religion are there to encourage you to conform. They argue that white collar crimes (which tend to be committed by the more powerful in society) are ignored, while crimes committed by the less powerful in society such as burglary and street crime are focussed on and seen as more serious.  Marxists would also argue that different social classes are policed differently, with the working class heavily......

Words: 1599 - Pages: 7

Free Essay

Uniform Crime Reports

...What are Uniform Crime Reports? What are Uniform Crime Reports Frank J. Schmalleger (2009, p. 38) writes in Criminology Today:An Integrative Introduction that the Uniform Crime Reports (UCR) are, “A Federal Bureau of Investigation (FBI) summation of crime statistics tallied annually and consisting primarily of data on crmes reported to the police and on arrests”. There are eight major offenses, called Part I offenses, reported on in the UCR and compared against the United States (U.S.) population in various regions. The UCR is used to compare crime rates that occur in different regions and from one year to the next. Another benefit to the UCR is that they show major changes in crime rates through the years. The FBI has compiled these reports since 1929, which created a standard through which all crimes throughout the country are reported. The UCR is published yearly and is available to all law enforcement agencies and accessible to all citizens via the Internet. “Rates of crime under the UCR/NIBRS Program are generally expressed as “x number of offenses per 100,000 people in the U.S. population” (Schmalleger, F., 2009, p. 39). The eight major offense categories reported on in the UCR are murder, forcible rape, robbery, aggravated assault, burglary, larceny, motor vehicle theft, and arson. The crime of murder is the first statistic reported in the UCR and should not be confused with homicide. Murder is, “…an unlawful homicide” and homicide is, “…the willful......

Words: 1763 - Pages: 8

Premium Essay

Criminology

...Criminolgy Fall 2013 3 Major Sources of Crime Data Uniform Crime Report Officially reported crime Counts the # of offences known to police . (Doesn’t count the onest that are not reported (For example, Police Arrests) Crimes Reported Voluntary Participation Self Report UCR Part I Violent Crimes: Homicide, aggravated assault, property crimes, larceny, theft “serious crimes” Sean.007@umb.edu 9/10/13 Risk and Personal Safety Crime isn’t exploding The polls say it’s America’s #1 concern , new prisons, longer sentences. Film: Are we scaring ourselves to Death? What are some of the crime myths identified in the film. Crime Surge Particulary violent crime Old, white, women as victims of crime Stranger homicide Violenct Crime Facts National Commission on the causes and prevention of Violence Primarily an urban phenomenon Offenders are primarily males, youth ages 15-24 years minority, low SES individuals - Victims “...” Perpertartors are most likely to be acquantances Primarily committed by repeat offenders 6% for between 53% and 71% of violent crime. What year was this report published? 1969. Victimolgy Emergence: 1940’s Hans Von Hentig First person to really bring the idea of victim’s role in criminal events Victims precipitaton - idea that the victim brings on the criminal act Who is more likely to be victimized Victim- Offender Link Likelihood of......

Words: 2997 - Pages: 12

Premium Essay

Thieves, Thugs and Neighborhood Poverty

...Thieves, Thugs, and Neighborhood Poverty David Bjerk Robert Day School of Economics and Finance Claremont McKenna College 500 East Ninth Street, Claremont CA 91711 Ph: 909-607-4471 david.bjerk@cmc.edu April 25, 2010 Abstract This paper develops a model of crime analyzing how such behavior is associated with individual and neighborhood poverty. The model shows that even under relatively minimal assumptions, a connection between individual poverty and both property and violent crimes will arise, and moreover, "neighborhood" e¤ects can develop, but will di¤er substantially in nature across crime types. A key implication is that greater economic segregation in a city should have no e¤ect or a negative e¤ect on property crime, but a positive e¤ect on violent crime. Using IV methods, I show this implication to be consistent with the empirical evidence. Keywords: Crime; Segregation; Neighborhood E¤ects; Instrumental Variables; Poverty. 1 “I don’ care if I got money, or work Monday through Friday. I just go shoot a t motherf*@#er on the weekends. If that’ what need to be done to keep my hood s and my young ones around here safe, then that’ what to get done” (quoted by s Landesman, 2007). 1 Introduction High rates of crime and violence in poor neighborhoods have been described by numerous scholars and journalists (Wilson, 1987; Krivo and Peterson, 1996; Kotlowitz, 1991; Patterson, 1991; Messner and Tardi¤, 1986, to name just a few). However, the quote above from a......

Words: 18032 - Pages: 73

Free Essay

The It Revolution

...NYSE Listed Eligible Options by Symbol Eligible Options by Symbol as of 25 Oct 2010 Symbol A AA AAI AAN AAP AAPL AATI AAV AAWW AB ABAT ABAX ABB ABC ABFS ABK ABMD ABT ABV ABX ACAD ACAS ACC ACCL ACE ACGL ACGY ACH ACI ACL ACM ACN ACOM ACOR ADBE ADI ADLR ADM ADP ADS ADSK ADTN ADY AEC AEE AEIS AEM AEO AEP AER Name Agilent Technologies Inc. ALCOA, INC AirTran Holdings, Inc. Aaron's, Inc. ADVANCE AUTO PARTS INC Apple Inc. Advanced Analogic Technologies, Inc. Advantage Oil & Gas LTD. Atlas Air Worldwide Holdings, Inc. AllianceBernstein Holding, L.P. Advanced Battery Technologies, Inc. Abaxis Inc ABB Ltd. AmerisourceBergen Corp. Arkansas Best Corp AMBAC Financial Group Abiomed Inc Abbott Laboratories AmBev Compamhia De Bebidas Das Ame Barrick Gold Corp. Acadia Pharmaceuticals Inc. American Capital Ltd American Campus Communities, Inc. Accelrys, Inc. ACE Limited Arch Capital Group Ltd Acergy S.A. Alum Corp of China Limited Arch Coal, Inc. ALCON Aecom Technology Corporation Accenture PLC Ancestry.com, Inc. Acorda Therapeutics, Inc. Adobe Systems Inc Analog Devices, Inc. Adolor Corp Archer-Daniels-Midland Co Automatic Data Processing Alliance Data Systems Autodesk Inc Adtran Inc AMERICAN DAIRY INC Associated Estates Realty Ameren Corporation Advanced Energy Industries Inc Agnico-Eagle Mines Ltd. American Eagle Outfitters American Electric Power Aercap Holdings N.V. NYSE Arca Lead Market Maker UBS SECURITIES, LLC MORGAN STANLEY & CO CITADEL SECURITIES LLC CITADEL SECURITIES LLC...

Words: 18155 - Pages: 73