Free Essay

The Technical Criminal

In:

Submitted By ssgtstafford3684
Words 1001
Pages 5
Assignment #3

The Technical Criminal: The Internet and Crime

CIS 170- Information Technology in Criminal Justice
Dr. Austen E. Ichu, PhD
November 11, 2013
Generally people have a tendency to adapt to their environments and the changes occurring around them. This has also been the case with the criminal element and the way they commit crimes. Computers and their functions had taken on an entirely new level of advancement in their capabilities with the introduction of the Internet to the general public. This Internet for most can be a useful resource. From gathering research for an academic project to attending a board room meeting remotely, the Internet has proven to be key in many aspects of human life today. The Internet has also given way to a slue of new crimes and negative activity. Cyber stalking, Cyber bullying, exploitation, sex crimes, financial fraud and the use of viruses and malicious code are just a few things that have become prevalent on the information super highway.
One of today’s largest concerns among parents is protecting their children from becoming victims of bullying. There was a time when you had to worry about the school bully running into while in the hallways of your school or out and about around your neighbor, but the situation surrounding bullying been given a technological advantage. Social media sites such, as Facebook.com, Twitter and Instagram have become the avenues for bullies to invade their victim’s homes and lives. In a recent cyber bullying case in Lakeland Florida, a 12-year-old Rebecca Sedgwick jumped to her death at a local cement plant. She had been the victim of at least 15 cyber bullies through many avenues. The torment for her started at her school and bled over to the Facebook.com. After she was taken out of school by her mother and closed her Facebook account she continued to receive harsh messages and comments through text messages and a messaging application known as KIK. According to investigators, one message asked the question; Why are you still alive? ("Rebecca Sedwick case: Both suicide victim and bully grew up in ‘disturbing’ family environments, cop says - NY Daily News") It was also believed that Rebecca herself had also engaged in the bullying of others but later became a target.
Another widely publicized crime that is prevalent on the Internet is the online harassment and exploitation on minors. Before the introduction of the Internet, sexual predators and stalkers would approach their victims or gain their victims trust through close relationships or friendships, but now the approach aspect has changed in that they can keep a level of anonymity. I work at the Dallas County Juvenile Justice Center as a Juvenile Supervision Officer. It is common for young children and teens to have access to the Internet but the amount of negative incidents involving children and the Internet is staggering. According to statistics reported by www.guardchild.com 77% of victims for online predators were age 14 or older and 1 in 33 youth had received aggressive solicitation. This means that a young person was asked to meet, received a phone call from a predator, sent correspondence, money or gifts ("Internet Statistics | Guard Child") As a father of four children I believe that these particular types of crimes are the most dangerous and problematic of any cyber crimes.
The use of the Internet to commit fraud is as normal today as having a cell phone.
A public schoolboy who masterminded an £18million or 24,123,600 U.S. dollars banking scam and boasted he was a 'legendary' fraudster was jailed for five years today. Nick Webber, 19, built an Internet empire using IT skills honed at exclusive boarding school Bradfield College by accessing school records to cancel his friends' detentions. He went on to create a social networking site for crooks dubbed 'Crimebook'. This was the headline in an online UK newspaper as teen Nick Webber was arrested for fraud that included fashioning a web sight with a database of stolen account numbers and credit card numbers. Webber was also a savvy hacker that was well versed in using viruses and malicious code to disrupt business functions. ("Public school boy who masterminded £18million Internet scam jailed for five years | Mail Online") These types of crimes before the Internet had a more manual approach in that sensitive information such as credit card numbers had to be gathered in a primitive manner. With individuals like Webber along with the use of the Internet this is a task that can be accomplished from home. The aforementioned crime is possible for a hacker to commit with use of viruses and malicious codes that create havoc in many different ways. Some viruses such as Trojan Horses can enter your programs under the guise of legitimate files and steal important information and cause irreparable damage to your system and others it is connected to. A combination of viruses and code known as a blended threat can steal information, gain control of your system and damage your system all at the same time. Using the aforementioned crimes as an example, with the use of blended threats all of them can be committed. From using viruses and malicious code to gain access to bank accounts, to gaining access of someone’s web cam to spy on them. Internet threats are a very real part of life, and you or a loved may be more vulnerable than you may hope.

References
Rebecca Sedgwick case: Both suicide victim and bully grew up in ‘disturbing’ family environments, cop says - NY Daily News. (n.d.). Retrieved from http://www.nydailynews.com/news/national/rebecca-sedwick-case-suicide-victim-bully-grew-disturbing-family-homes-article-1.1496991
Internet Statistics | GuardChild. (n.d.). Retrieved from http://www.guardchild.com/statistics/
Public school boy who masterminded £18million Internet scam jailed for five years | Mail Online. (n.d.). Retrieved from http://www.dailymail.co.uk/news/article-1362207/Public-school-boy-masterminded-18million-Internet-scam-jailed-years.html

Similar Documents

Premium Essay

Criminal Justice

...3/23/15 1. How does the use of probation affect the corrections system? Why is it used so extensively? Probation affects corrections in the sense that it saves them money and offers new ways for criminals to be rehabilitated. The use of probation has soared recently due to overcrowding in prisons and the cost to house said criminals. Probation also allows a better way for criminals to rehabilitate themselves and have a more comfortable experience while doing so. 2. What is presentence investigation and how does it contribute to the sentence imposed? An investigation and summary report of a convicted offender's background that helps the judge decide on an appropriate sentence. Also known as a presentence report. This report allows a more thorough understanding of what caused the criminal to commit his act. This in turn allows the sentence to be more effective in the rehabilitation of criminals. 3. Name some of the special conditions which may be imposed on probationers. Standard probation conditions are conditions that are imposed no matter the type or level of the crime. Standard conditions generally include rehabilitative terms, such as the attendance to group or individual therapy, submission to random drug testing, avoidance of places and/or people that are associated with criminal activity, the requirement that the defendant not commit another federal, state, or local crime, and when possible, the maintenance of gainful employment and/or education. Punitive conditions...

Words: 380 - Pages: 2

Premium Essay

Search and Seizure

...Constitutional Law March 16, 2014 Erin Shriver SEARCH AND SEIZURE Constitutional Search The high school students were throwing a party that created so much noise that a noise complaint was lodged with the police by a neighbor. This gave the police the right to enter onto the property to investigate the complaint. Once they arrived at the residence and started talking to the party goers they smelled marijuana on the individuals. Because of the reasonable suspicion and probable cause that criminal activity was taking place they had a right to search the premises. This is found in the Fourth Amendment under Probable Cause and Reasonable Suspicion (Farlex, Inc., 2014).To protect evidence from being destroyed they also had a need for the search of the premises. To protect themselves as well as possible evidence they were also permitted to frisk the individuals that were out on the porch of the house. This exercise is permitted when they have reasonable suspicion that a criminal activity is taking place (Daniel E. Hall, 2012, pp. 509-510). While frisking the individuals a bag of marijuana was found. This led the police officers to then call for backup for searching the house before evidence inside the property could be destroyed before a warrant could be obtained. While waiting on the backup they proceeded to search the remaining individuals inside the home, again to keep themselves safe. Drugs are a type of evidence that can disappear either by use or being destroyed. Under...

Words: 1268 - Pages: 6

Premium Essay

Week 1

...Technical Communication Methods and Practices Paper Jimmy Bolden, Michael Mosley, Deshonda Council, Jamie Jackson, Lethia Hemingway CJA/304 August 19, 2015 Judge Michael Joyner Technical Communication Methods and Practices Paper Technical communication can be considered in two different ways. The two ways are the sets of applications and the ability to make and share information with other people in the workplace. Emails responded to and sent, instant messages, phone calls, and conversations with fellow officers are all examples of technical communications. Each professional uses the majority of their day using the four communication skills. The skills used are speaking, listening, writing, and reading. The team will be discussing the technological tools that might be used in the communication process, current technology, and future technologies. One technological tool that is currently used in the communication process is the Mobile Data Terminal (MDT). According to Meehan (1998), “The ways in which officers shape and alter their uses of Mobile Data Terminal technology to preserve their autonomy, maintain solidarity with their co-workers, and manage accountability is analyzed as a form of resistance to the potential of this technology to fragment work assignments and control information”. The Mobile Data Terminal has been modified in the past few years so that officers can run random people’s identity in a matter of seconds. Before the Mobile Date Terminal, the...

Words: 1202 - Pages: 5

Premium Essay

Crimes

...as an epidemic for conventional criminal offenses. Within cyber crimes deception, embezzlement, blackmail, identity theft, and identity fraud are some well known crimes. According to Controlling cyber-crime and gambling: Problems and paradoxes in the mediation of law and criminal organization:​ The main elements explaining computer crime and its organization may be found within the illegal activity and the socio-legal problems confronted there. This explanatory approach emphasizes: (a) that at a given stage of technological development, a given illegal act presents certain technical and social problems which must be negotiated for its successful completion; (b) that we can identify the most efficient types of organizations for managing those problems; and (c) that the existence of these kinds of organizations are explained in terms of their technical efficiency in the situations at hand and in their ability to avoid, evade, and neutralize the efforts of law enforcement (McMullan, 2007). There is a lot to say about cybercrimes and the sociology of but, this paper will cover what is trending in cyber crimes. Some trends are organized criminal activity and others are individualized. Organized cybercrimes Organized criminal groups have adopted the trend of technology within their criminal activity. They have placed a value on information and communication technology​They a have used the technology to “facilitate their profit-generating criminal activities such as drug trafficking;...

Words: 634 - Pages: 3

Premium Essay

Role of the Internet & Crime

...The Role of the Internet and Crime The Role of the Internet and Crime CIS 170 May 13, 2013 How the Internet has Aided Crime   The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft.   The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very limits of the U.S. Constitution has arrived. Above all, the Internet is used to commit against persons that include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important criminal activity known today. With just a few keystrokes, an individual can have access to all forms of personal information, bomb-making instructions, and poison recipes; and a plethora of extremist ideologies expressing everything from radical religious cults to clandestine organized crime groups.    Examples how Internet has Aided Crime    One of the examples could be considered as identity theft. Identity theft is the use of one person's personal information by another to commit fraud or other crimes. The most common forms of identity...

Words: 1226 - Pages: 5

Premium Essay

Investigating Terrorism

...every investigator needs to know when dealing with terrorists groups. These techniques can give an investigator the information that is needed with different situations. These techniques are mail cover, the investigative task force, undercover operations, and technical investigative techniques. Of these four techniques the technical investigative is the only one that is not used to prevent an attack. Mail cover is used to obtain information that is on the outside of correspondences that is sent through the United States Postal Service. These techniques are normally preformed by postal workers and the mail is never opened. Suspicious mail is photographed or copied and then the copy is given to the investigators. The investigators then look for any possible coded message. They also learn to recognize the handwriting. This technique can be used to prevent or intervene in an attack. For example, times for meetings are often written in code on the envelope and once the investigator has this information they can be at this meeting as well. An investigative task force is another technique that is used. This is when two law enforcement agencies pool their resources to combat terrorists and criminals. Each agency may have different and important information that the other agency needs. Attacks can be prevented when valuable information is shared. For example, one agency has the time and date of the meeting and the other agency knows the location. When they...

Words: 464 - Pages: 2

Premium Essay

Cja394 Court Issues Analysis

...came from this type of courthouse violence. Targeted violence involves someone who intend on causing harm or starting something in the courthouse. This type of violence is obviously premeditated and the attacker normally tries to avoid any other confrontations because they want everything to go as planned and unnoticed. In order to make security better in courthouses the threat assessment is being used. It has three principles: 1) to realize that targeted violence is the result of the thinking and acting process. 2) To know the difference between someone making an expressed threat and posing threat. 3) The risk for violence depends on the interaction between the attacker, target, situation, and setting. There is no set timing for a criminal case to...

Words: 1131 - Pages: 5

Free Essay

Forensic Science in the 21st Century

...PSYCHOLOGICAL PROFILING STEVEN HOENIG 2-29-16 This paper will examine my perception and concept of forensic science in the 21st century. It will also examine the importance of forensic science to policing criminal investigation court process, and the efforts of various levels in security. In addition to analyzing the importance of forensic science, I will give a historical approach. I will discuss the accuracy of the media representation of forensic science and how issues. Lastly, I will discuss the influence the CSI effect have on the judicial process. Forensic Science is the application of science to criminal and civil laws that are enforced by law enforcement agencies in a criminal justice system. Another definition of forensic science is principles and techniques to matters of criminal justice, especially as it relates to the collection, examination, and analysis of physical evidence. In 1929, a Los Angeles police department establish the first American forensic lab. Forensic science has been around over 300 years or more and it continues to improve and emerge today as science and technical knowledge find more improved and accurate techniques. Forensic science has come to be a critical instrument in allowing guilt or demonstrating innocence in the system of criminal justice. In the late 80’s (DNA), society was accepting of (DNA) and forensic science continues to develop and unfold Technology in this fast pace world. Forensic science has been through many changes because...

Words: 1265 - Pages: 6

Free Essay

Cja 304 Entire Course

...CJA 304 Entire Course http://homeworkgallery.com/index.php/product/cja-304-entire-course/ http://homeworkgallery.com/index.php/product/cja-304-entire-course/ http://homeworkgallery.com/index.php/product/cja-304-entire-course/ CJA 304 Learning Team Assignment Technical Communication Methods and Practices Presentation This archive file contains CJA 363 aka CJA 304 Learning Team Assignment Technical Communication Methods and Practices Presentation. CJA 304 Learning Team Assignment Technical Communication Methods and Practices Paper This document will explain the whole process of how an officer must get in touch with another officer and the department or dispatch center before or after an event. This task will also determine the technology devices as well as resources which may be utilized in the communication process. This document will also tackle how technology can be employed to communicate more efficiently within the different areas of criminal justice. Additionally these authors will explore as well as describe the future of technologies not the presently in existence for assistance in the interview procedures and also the interrogation process too. CJA 304 Press Release A plan has been lately allotted the City of New York’s School Safety Agents who perform an integral part in the safety of the students at public schools. New York City’s Police Commissioner Raymond W. Kelly joined with the Kings County District Lawyer...

Words: 1261 - Pages: 6

Premium Essay

Cultural Considerations

...mean that the entire culture of people will make the same mistake. People of different cultures do not always receive fair treat in the justice system. An example of this would be an African American male who is serving 20 years in prison because he was falsely indentified during a lineup. People have to be willing to acknowledge that he or she is not sure that the individuals in the lineup are the guilty party. Some people like to say that African Americans look alike. This is not true. Some people may have similar features but this does not mean that he or she looks alike. African Americans are often not hired for certain positions for fear that he or she will not be honest. This type of behavior and thinking should not occur in the criminal justice system. Society has to learn to treat people fair. This will not be an easy task for many people. In society it is normal to have favoritism. Many Hispanics or Mexicans are thought to be hard worker and that he or she will work for low wages. When a person is a hard worker he or she should be compensated by his or her pay. Many Hispanics or...

Words: 1423 - Pages: 6

Premium Essay

Criminal Justice Trends Evaluation

...CJA 394 WEEK 1 Criminal Justice Trends Evaluation Criminal Justice Trends Evaluation John Doe CJA 394 October 01, 2001 Jane Doedy Criminal Justice Trends Evaluation The criminal justice system is forever adjusting to protect and serve a changing society. The paper evaluates, identifies and assesses recent future and current trends affecting the criminal justice system. Lastly, it defines the values of the system in a changing society. Recent trends affecting the criminal justice system are related to gender and racial barriers. According to Roslyn Muraskin and Albert R. Roberts (2009 ), assessments of statuses of women and minorities in police work shows that there are obstacles in official and informal structures of police work organizations related to gender and race. Regardless of assessment studies, which show that women are effective patrol officers, organizational principles of law enforcement has repelled the combination of women into patrol officers for more than 20 years. There are three kinds of organizational resistance to slowing down staffing and preservation of female patrol officers. The first organizational resistance is called Technical Resistance. Technical Resistance comprises of failure to adjust police uniforms, gear, and tools sufficiently for women, and constant issues on physical testing, and firearms during their drills, and preperations. The second organizational resistance is named Political and Cultural Resistance. According to Roslyn Muraskin...

Words: 1573 - Pages: 7

Premium Essay

Week Four Cja/484

...The technical function that are within a criminal justice of corrections environment is they have smart cards that has all of the inmates information also his or her movements , medical care he or she has, and as well what they bought from the commissary their meals. That they have eaten, treatment needs, also make sure the right person give access in areas that inmates cannot go. They have electric stun lethal fence they put in double perimeter fences, which on galvanized post are 30 feet apart, ten feet from the outer perimeter fence. Also they are 15 feet from the inner perimeters field, with any movement will send 10,000 volts through a person body killing in this process which this help keep the inmates from escaping. In addition, criminal justice system uses perimeter security and control devices they uses electronic sensors and monitor with the tension within the barbed-wire barricades that has seismometers. That goes off in fence has movement or motion not of the guards and staff members, which if it does lets off a loud alarm sound. That set off warning signals, in the guard booth and patrol cars and puts cameras on those areas to view the situation. The way that technological functions relate, with security and management functions in the correctional environment that technological function that was put in place help kept the staff and the inmates safe. It helps lower the possibility of inmates escaping and making sure that they can quickly response to emergency...

Words: 452 - Pages: 2

Premium Essay

Citibank Case Study

...out before it was substantiated. Although time is of the essence in situations such as this, reliable and complete information is also essential. 2. As a consumer I do believe that banks currently make every effort to protect the assets that they are entrusted with. However because of the way criminals are constantly finding ways to get into systems, I do believe that the banking industry must stay abreast of the schemes and make rapid changes as soon as they become know. Also they should stay ahead of those criminals and make sure that the safeguards are in place. They should have methods in place that test the systems against hackers. 3. The government role should include but not be limited to placing rules and regulations in place that make the financial institution accountable for the personal information that the customers place in their care. These rules should also place liability on the institutions whenever there is a breach. Standards should be maintained that would mandate that all financial institution have to security measures that are multi-tiered and not easily accessible without passing certain test. 4. Hacking incidents is a way of life in this technical age, however it not alleviate the need or requirement that this...

Words: 380 - Pages: 2

Free Essay

Regulation of Exports

...Sudan, Syria - Pres. Bush took North Korea off of the list - Libya was also taken off the list after renouncing its attempts to possess weapons of mass destruction 3. To limit the sale of strategic goods and raw materials in short supply - Could apply to food, medicine, basic metals, or natural resources B. Effectiveness of Trade Sanctions - Opponents and Proponents w/no clear consensus - However, to be effective, sanctions need universal cooperation II. History of U.S. Export Laws A. The Rationale - U.S. concerns about technology and weaponry falling into enemy hands Therefore, it regulates the export of arms, technology, commodities with military applications, and other strategic commodities including technical data, component parts, and chemicals B. Development of the Legal Framework - American Revolution: Congress outlawed exports to Britain - Early 1900s: export controls in response to either war or emergency conditions - WWII: export controls were reintroduced - Export Control Act of 1949: reflected the archetypical battle between...

Words: 1699 - Pages: 7

Free Essay

Business in Virtual Library

...abstracts, reviews, and full-text for articles published in ACM periodicals and conference proceedings. Criminology This database includes the full-text of 24 journals published by SAGE and participating societies. It covers such subjects as Criminal Justice, Juvenile Delinquency, Juvenile Justice, Corrections, Penology, Policing, Forensic Psychology, and Family and Domestic Violence. EbscoHost (all) Ebsco databases provide access to numerous publications. Select this link to search all databases simultaneously. To search each database separately, use the specific links to the named databases. EbscoHost Academic Search Elite Search academic journals for topics in all areas of academic study; many peer-reviewed titles are included. EbscoHost Business Source Premier Search periodicals covering a wide variety of business topics. EbscoHost CINAHL Plus with Full Text Search nursing and allied health journals. EbscoHost MasterFile Premier Search periodicals covering a wide variety of topics including general reference, business, education, health, and science. EbscoHost Regional Business News Search regional business publications from major metropolitan areas. EbscoHost SocIndex with Full Text Search for articles related to sociology, criminal justice, criminology, and ethnic and gender studies. Full Text Electronic Journals Use this portal to locate full-text magazines, journals, and newspapers in the various periodical databases. Gale Computer Database Search this database...

Words: 676 - Pages: 3