Free Essay

Crme

In: Other Topics

Submitted By davisl36
Words 1491
Pages 6
Assignment 1: Digital Computer Crime Information Technology in Criminal Justice Lashavia Davis Strayer University Professor Marina Stakic

February 4, 2015

Computer crimes refer to any crime that involves a computer and a network, where unauthorized use of the computers where it may or may not have played an instrumental part in committing the crime. Computer crimes have a broad range of potentially illegal activities. It may be divided into one of two types of categories, “crimes that target computer networks or devices directly, and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.’” Which we have four major categories that fit inside one of two types of categories; the computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer.

This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network intruders who primary focus is to alter critical data, are a ways a computer can be used as the target. One of the earliest cases of the computer being target took place when Robert Morris Jr, a computer science student who wrote a self-replicating, self-propagating program that infected an estimated 6,000 computer systems, that later became known as “The Morris Worm.”

Computers can be utilized as an instrument or tool to facilitate criminal activity which refers to the processes of the computer used to gain some other criminal objective. Such as theft where attacker is taking property with intent of permanent depriving the owner of their property or servicers. Theft of data and services includes theft of sensitive information, proprietary information, or other intellectual property that is stored on personal, government, or corporate computer systems. Hackers can also create fraud and now threats and harassment of individuals and companies. An example of the computer being used as an instrument of crime would be on March of 2007, Robert Soloway, also known as “The Spam King” was arrested on 35 charges of fraud, money laundering, and identity theft. Soloway’s activities involved “hijacking computers from unsuspecting customers and using them to disseminate Spam that advertised his fraudulent marketing services, sending tens of millions of Spam messages using the hijacked computers.
Computers are incidental to other crimes; merely the computer is not essential for the crime to occur but helps facilitate the offense. When this takes place the computers help the crime to occur faster and also permit processing of greater amounts of information within a shortest possible period of time, making the computer crime more difficult to identify and trace. Some examples of such crimes include money laundering, processing and distribution of pornographic information unlawful banking transactions, and encrypting or erasing data files and criminal records. One form of this crime taking place was in twenty-fourteen in Miami, Florida. Alvaro López Tardón, of Miami Beach, was sentenced to one hundred and fifty years in prison. Tardón was the head of an international narcotics trafficking and money laundering scam which distributed over 7,500 kilograms of South American cocaine in Madrid and laundered over $14,000,000 in narcotics proceeds in Miami.
A computer associated with prevalence of crimes is the presence of computers only. These crimes are occurring as a result of advancements of technology and use of computers. Some examples include violation of copyright of computer programs software, such as duplicated, packaged, and selling illegally, component theft, identity theft, counterfeiting, and any other peripherals. One form of this computer crime took place in Alaska, against “Amparo-Vazquez, aka Japhet Soto Santiago, aka Luis Angel Cortez, a citizen of the Dominican Republic formerly residing in Alaska” was sentenced to prison, Amparo-Vazquez conspiring to defraud the government, to use stolen identities to file income tax returns for the purpose of obtaining fraudulent income tax refunds, with stolen identities of more than 2,600 individuals.
Identity theft typically occurs when a cybercriminal successfully steals a person’s person identity and personal information. But it remains one of most common forms of digital crime. This type of crime is a gateway to other cybercrimes such as tax-refund fraud, credit-card fraud, loan fraud and other similar crimes. Some examples of identity theft’s purposes are: opening a line of credit purchasing goods or services, renting or buying a house or apartment and obtaining employment. Identity theft includes three general types of crimes, “unauthorized use or attempted use of an existing account, unauthorized use or attempted use of personal information to open a new account and misuse of personal information for a fraudulent purpose”.
When determine a cyber-terrorism that will present the greatest threat to the United States I would have said an attack on our infrastructure reliant. Since the united states “has identified itself as the most infrastructure reliant of any nation.” Which might be true because we significant depend on our national information system which includes eight area of “virtual national life support system: telecommunications, banking and finance, electrical power, oil and gas distribution and storage, water supply, transportation, emergency services, and government services.” Imagine if terroirs and foreign government could tap into our system it would possibly makes us as a country very indefensible against any threats we may come under. But most of all our country would not be able to function if we were to have a major shutdown, which explains why both former President George W Bush and Current President Barak Obama has developed a plan to protect the nation infrastructure system. President Obama created “The Cyber Space Policy Review”. In Which
“…The Federal Government shall work with critical infrastructure owners and operators and SLTT entities to take proactive steps to manage risk and strengthen the security and resilience of the Nation's critical infrastructure, considering all hazards that could have a debilitating impact on national security, economic stability, public health and safety, or any combination thereof. These efforts shall seek to reduce vulnerabilities, minimize consequences, identify and disrupt threats, and hasten response and recovery efforts related to critical infrastructure (Barak Obama.)”
Based on this finding I determined this area cyber terrorism can created a great and most significant threat at this present time to the United State of American. As computer technologies keeps growing, so does the crime and threats of cybercriminal’s and cyberterrorist. Which mean the governments, court system, and law enforcement has to shift over to protect Business and Individuals from the leading and expending word of Cybercrime and Cyberterrorism along with the daily task list as while. The roles and responsible the Department of Justice alongside law enforcement are organize into categories The U.S Attorney’s Office, Federal Bureau of Investigation Which have many division under them, significant to serve us to better. Under the Department of Justice a programs called Criminal Division’s Computer Crime and Intellectual Property Section was created to prosecuted violations of federal code covered by the computer fraud abuse act, which works under a sub united called CHIP Computer hacking and property. Who focus on prosecuting computer hacking, fraud and intellectual property cases. The federal Bureau of Investigation has many divisions working under them to help maintain cybercrime. There primary role is to capture the criminal behind the computer intrusion. Their primary role is to capture the criminal behind the computer intrusion, under a program called “InfraGardr” created to join the Department of Justice CCIPS and CHIP Programs, housed in the bureau’s cyber division to exchange information in collaboration in the fight against cybercrimes. While assisting the U.S Attorney Office whose primary goal is to representing the federal government in court to prosecuting federal suspects brought against cybercriminals.
The many efforts Law enforcement have had with bettering counteract of computer crimes, they should look into opening a real time portal from the time the criminal takes place to actual time that located and catch the crime being committed. Such as creating a device that can be put into a computer to detective programs running in the background and breach in the computer security system made from an outside network, that automatic transmit to the correct division to monitor the crime being committed, would be a great tool to close the gap on cybercrime to the law enforcement world.

References www.dictionary.com Eric J. Fritsch, John Liederbach & Robert Taylor Digital Crime and Digital Terrorism (3rd ed). www.FBI.gov www.IRS.gov www.lectlaw.com www.nw3c.com
www.whitehouse.gov

Similar Documents

Premium Essay

Thieves, Thugs and Neighborhood Poverty

...urban society. Berkeley: Unversity of California Press. [21] Kling, J., Ludwig, J., Katz, L., 2005. Neighborhood e¤ects on crime for female and male youth: evidence from a randomized housing voucher experiment. Quarterly Journal of Economics 120(1). [22] Kotlowitz, A., 1991. There are no children here, New York: Random House Inc. [23] Krivo, L., Peterson, R.D., 1996. Extremely disadvantaged neighborhoods and urban crime. Social Forces 75(2): 619-650. [24] Landesman, P., 2007. Nine miles and spreading. LA Weekly, December 14-20: 44-51. [25] Logan, J.R., Messner, S., 1987. Racial residential segregation and suburban violent crime. Social Science Quarterly 68: 510-527. [26] Massey, D.S., 1995. Getting away with murder: segregation and violent crme in urban america. University of Pennsylvania Law Review 143(5): 1203-1232. [27] Mawby, R.I., 1977. Defensible space: a theoretical and empirical appraisal. Urban Studies 14: 169-180. [28] Massey, D.S., Denton, N., 1988. Suburbanization and segregation in U.S. metropolitan areas. American Journal of Sociology 94(3): 592-626. 36 [29] Messner, S. F., Tardi¤, K., 1986. Economic inequality and levels of homicide: an analysis of urban neighborhoods. Criminology 24: 297-317. [30] Molumby, T., 1976. Patterns of crime in a university housing project. American Behavioral Scientist 20: 247-261. [31] Murray, M.P., 2006. Avoiding invalid instruments and coping with weak instruments. Journal of Economic Perspectives 20(4): 111-132. [32]......

Words: 18032 - Pages: 73

Premium Essay

Criminology

...Gambler’s fallacy? Labeling/ societal reaction theory Routine activities Theory - What are routine activities? day to day activities During dauly routine activities, people put themselves in situations that increase or decrease their risk of victimization Ex: how do you unintentionally put yourself at risk during your commute to the university. Crime is likely to occur when 3 elements converge in time and space Motivated offender Suitable target Lack of capable guardian Who is a motivated offenders All of us - Suitable target - Unlocked car?? Unlocked house? The absense of a capable guardian Why capable guardian - rather than police Criminal Oppurunities The physical environment can encourage or discourage crme Shifts in lifestyles patters Post WWII U.S. Empty Homes - Unsupervised kids ; more people in public spaces ; Increase in single occupant residences Big changes in the production of goods Increase in criminal oppurtunities Rational Choice: - Are offednders really rational? Things to think about - Sociologyical Theories of Crime - The Chicago School - Social Disorganiztion From Biological to Sociological Positivism Biological theories dominated early 20th century criminolgy theory By 1930’s - biological explanations are questioned Ehtical Issues - racists; prediction Evidence that people change Biological approaches were too deterministics Atavist = criminal Vast Social Change couldn’t......

Words: 2997 - Pages: 12

Free Essay

The It Revolution

...TIMBER HILL LLC TIMBER HILL LLC CITADEL SECURITIES LLC WOLVERINE TRADING, L.P. TIMBER HILL LLC CUTLER GROUP, LP TIMBER HILL LLC CUTLER GROUP, LP WOLVERINE TRADING, L.P. GOLDMAN SACHS & CO CITADEL SECURITIES LLC MORGAN STANLEY & CO UBS SECURITIES, LLC CITIGROUP DERIVATIVES MKTS INC. WOLVERINE TRADING, L.P. CITADEL SECURITIES LLC WOLVERINE TRADING, L.P. CITADEL SECURITIES LLC WOLVERINE TRADING, L.P. BARCLAYS CAPITAL INC. CITADEL SECURITIES LLC TIMBER HILL LLC CITADEL SECURITIES LLC BARCLAYS CAPITAL INC. CITADEL SECURITIES LLC BARCLAYS CAPITAL INC. CITADEL SECURITIES LLC WOLVERINE TRADING, L.P. WOLVERINE TRADING, L.P. CITADEL SECURITIES LLC TIMBER HILL LLC CITADEL SECURITIES LLC BARCLAYS CAPITAL INC. CR CRA CRAY CRDN CREE CRI CRIC CRK CRL CRM CRME CRNT CROX CRR CRS CRUS CRXL CRY CRZO CS CSC CSCO CSE CSH CSIQ CSJ CSKI CSR CSTR CSX CTAS CTB CTCM CTCT CTDC CTEL CTFO CTIC CTL CTRP CTSH CTV CTXS CUTR CUZ CVA CVBF CVC CVD CVE CVH CVLT CVO CVS CVVT CVX CWH CWTR CX CXO CXW CY CYB CYBX Crane Company Celera Corporation Cray, Inc. Ceradyne Inc Cree Inc Carter's Inc. CHINA REAL ESTATE INFORMATION CORP Comstock Resources, Inc. Charles River Laboratorie Salesforce.com, Inc. Cardiome Pharma Corporation Ceragon Networks Ltd Crocs, Inc. Carbo Ceramics Inc. Carpenter Technology Corp Cirrus Logic Inc Crucell CryoLife, Inc. Carrizo Oil & Gas Inc Credit Suisse Group Computer Sciences Corp. Cisco Systems Inc CapitalSource Inc. Cash America International, Inc. Canadian Solar, Inc. iShares......

Words: 18155 - Pages: 73

Premium Essay

Outline and Assess Feminist Views of Crme and Deviance.

...Outline and assess Feminist views on crime and deviance. (50) Within Feminism itself there are many different approaches to crime and deviance including Liberalism, Radicalism and Post-modernism. Each of them believes that crime, or the lack of crime, is a result of the patriarchal dominance in society. Feminists believe that the patriarchy generates crime against women whilst discouraging deviancy amongst women. The official crime statistics show that men tend to commit more crime than women, and some Feminists would agree with this. One theory put forward is that this is because of the differential socialisation of males and females. Oakley argues that males are socialised to be aggressive, self-seeking and individualistic, which can therefore lead to them taking more risks and committing criminal acts. For example, if a boy is socialised into an aggressive role then he might express this through domestic violence against his partner when he is older. In the same way, a self-seeking male will do anything to satisfy his needs, which may explain male rape against women. Oakley states that females, however, are socialised into non-criminal norms and values that stress co-operation, tenderness and caring for others. This tells us that women are much less likely to commit crimes that would hurt another person, such as murder and rape, and this is reflected in the statistics. Moreover, Radical Feminist Heidensohn claims that most academics in the area of sociology and......

Words: 1146 - Pages: 5

Premium Essay

Crime and Deviancy and the Effects of the Labelling Theory ( 40 Marks )

...rather than the upper classes when there crime ( normally cooperate or occupational crimes ) actually accounts for nearly 94% of financial loss in crimes . Fourthly individual motivation which the Marxist state provides an explination for why people feel motivated to commut crime. Bonger pointed out that capitalism is based on competition selfishness and greed and this formed peoples attitudes to life. Therefore crime was seen as a perfectly normal outcome of these values , if that meant looking after ones self at the unfortunate expense of others. Bonger belives people are driven to crime because of such desperate conditions . however we can see a flaw in this theory . If this was true why would crimes like white collar crimes and cooperate crme exist if it was merely just there for when people were desperate. Katz and Lyng would argue therefore that it’s the need for the thrill why some people commit crime and the greed to want more to what they already have, linking to the masculinity theory of feeling matcho in such business. And finally crime and control. Crime and control shows how the ruling classes often want to take the attention away from situations where they may be in the wrong just to avoid people disbelieving in the ruling system that we have in society . Almost as a scapegoat. Marxists often use the example in whats known as the new criminology, which fuses together classical Marxism and interactionist ideas. A good example of this was based on Halls work......

Words: 1599 - Pages: 7

Free Essay

Uniform Crime Reports

...What are Uniform Crime Reports? What are Uniform Crime Reports Frank J. Schmalleger (2009, p. 38) writes in Criminology Today:An Integrative Introduction that the Uniform Crime Reports (UCR) are, “A Federal Bureau of Investigation (FBI) summation of crime statistics tallied annually and consisting primarily of data on crmes reported to the police and on arrests”. There are eight major offenses, called Part I offenses, reported on in the UCR and compared against the United States (U.S.) population in various regions. The UCR is used to compare crime rates that occur in different regions and from one year to the next. Another benefit to the UCR is that they show major changes in crime rates through the years. The FBI has compiled these reports since 1929, which created a standard through which all crimes throughout the country are reported. The UCR is published yearly and is available to all law enforcement agencies and accessible to all citizens via the Internet. “Rates of crime under the UCR/NIBRS Program are generally expressed as “x number of offenses per 100,000 people in the U.S. population” (Schmalleger, F., 2009, p. 39). The eight major offense categories reported on in the UCR are murder, forcible rape, robbery, aggravated assault, burglary, larceny, motor vehicle theft, and arson. The crime of murder is the first statistic reported in the UCR and should not be confused with homicide. Murder is, “…an unlawful homicide” and homicide is, “…the willful......

Words: 1763 - Pages: 8