The Role of the Internet and Crime
Strayer University
Crime has been around for a long time and will probably never disappear. With the invention of many things such as the wheel, the tool helps criminals. The wheel helped the criminals get away faster which made it harder to catch them. Criminals will always look for ways to make their “job” easier. With the advancement of technology come the advanced criminals. The internet has become one of the biggest tools for criminals by making it easier to commit some of the oldest crimes such as theft, extortion, and money laundering. The criminal does not have to be present to commit crime; this means there is a broader area to find victims. They can interact
…show more content…
Experts worry that malicious codes hidden in infected computers or released in worms will produce criminal attacks against businesses. “The Honey Net Project -- a nonprofit research organization of security professionals -- published a report describing how the organization has monitored individuals trading or dealing with stolen credit card information over the Internet (Germain, J. M. 2003).”
References
Frieden, T. (2009, October 7). Authorities: 100 in U.S. and Egypt charged in ID theft ring - CNN.com. CNN.com - Breaking News, U.S., World, Weather, Entertainment & Video News. Retrieved May 17, 2013, from http://www.cnn.com/2009/WORLD/meast/10/07/us.egypt.id.theft/index.html?iref=allsearch
Media Group. (2013, May 17). Kent man arrested in distribution, possession of child porn. KIROTV. Retrieved May 17, 2013, from www.kirotv.com/news/news/kent-man-arrested-distribution-possession-child-po/nXtqQ/http://
Finklea, K. (2010, December 22). Congressional Research Service. CRS Report for Congress Prepared for Members and Committees of Congress Organized Crime in the United States: Trends and Issues for Congress . Retrieved May 17, 2013, from www.fas.org/sgp/crs/misc/R40525.pdf
Germain, J. M. (2003, September 27). Computer Viruses and Organized Crime: The Inside Story | Security | TechNewsWorld. TechNewsWorld: All Tech - All The Time. Retrieved May 17, 2013, from
The Department of Justice report entitled "Investigations Involving the Internet and Computer Networks" (2007) states that the Internet may be used by criminals for various reasons including the trading or sharing of information, concealing or assuming another identity, identifying and gathering information on victims and communicating with co-conspirators. The Internet may also be used by criminals for the distribution of information or alternatively misinformation and for the coordination of meetings,
The internet has brought upon a new revolution of global interconnection where contacting someone on the other side of the world is just a click away, but with this international phenomenon comes an increased susceptibility with unfamiliar technology. Internet crime is compiled of all non-physical crime with the aid of a computer. Although broad in definition internet crimes are largely composed of acts such as cyber fraud, ‘phishing’ (username and password hacking), cyber stalking and hacking. Internet crime does not pose an overwhelming issue in society in terms of its
Just in the last decade, there has been a 29% increase in crimes committed against residents and a 22% increase for business losses due to online crimes (Meyer). Another large issue with technology is that they monitor an individualś every move, for example, a phone company, AT&T, was monitoring their customers phones to be able to “use your individual Web browsing information, like the search terms you enter and the Web pages you visit, to tailor ads and offers to your interests” (Silverman 282). Although the increase in such crimes can potentially cause many issues and obstacles for an individual, they do not physically harm anyone. Such crimes as internet fraud and any other crime that can be committed online, are all fixable and can be prevented. There are security systems that can help protect against frauds and prevent any more from occurring, which makes this issue much less crucial to stop. It is also possible to contact police and bankers to stop this from occurring and they can help you regain all of your losses. The government also has the NSA, the National Security Agency, to monitor all internet movements, which helps stop many of these issues. New technology has helped prevent an immense amount of street crimes, that without the internet, would have only continued to rise, while millions of people would have continued to be murdered.
Cyber threats have increased dramatically over the past few years, with large companies such as Amazon, Netflex, PayPal, Wikipedia and most recently Equifax, experiencing high profile breaches. Traditional tools, defenses and responses have been strained with keeping up with the level and sophistication of an very organized and ubiquitous hacking community, which has coalesced into organized crime syndicates that the FBI and law enforcement continues to battle.
Times have changed what was known as organized crime has been replaced by Cybercrimes (Heists: Cybercrimes with Ben Hammersley). Cybercrimes have risen dramatically in recent years and have become a major issue the United States and company’s face today jeopardizing as well as threatening the critical infrastructure of America (Cyberwar Threat, 2005). Sadly, the status quo of cyber security is very unstable with the advancements and growth which has put most individuals and businesses into an enormous threat (Agustina, 2015).
Crime is a familiar and perilous concern in American society, and crime damages the foundation of this America. The ongoing population shift from rural to urban areas has helped to facilitate crime in the United States through the decades. Showing the focused element and impact of crime in society and the consequence of crime in urban areas, is to better understand the people, and knowing that when criminals know the procedures of the crime they get new opportunity to do it. Examining the crimes can give insight into who and why, but there are many extenuating circumstances which need to be factored. Urbanization has given opportunity and capability for the criminal element to thrive. Criminal activities are an onus for any nation,
“The Internet allows communication across national and international boundaries; but, not all of this communication is for benign purposes. The Internet provides easy utilization and relative anonymity to criminal’s intent on exploiting and/or stalking online victims through the perpetration of sex crimes. The nature of crimes committed electronically takes on a different character and presents unique difficulties for law enforcement.” (Taylor, Fritsch, & Liederbach)
The agencies employed by governments to police the web in order to protect the vulnerable have seen an increase in child pornography and online fraud. The speed at which information can be distributed and the number of people that can be reached attracts those that are intent on causing harm. The term “cybercrime” is becoming more widely used. The financial gains that can be made and the anonymity the internet can provide, make the virtual world of cyberspace a haven for criminals. Although the internet has huge benefits for information gathering and social networking, in the wrong hands it can cause harm to the vulnerable and criminals are able to vanish into the underground with the use of false identities that are hard to track online.
By the year of 2016, investments in online security are expected to reach $86bn (Contu et al, 2012). Although this might seem a large sum of money, it is considered necessary since there is an increase in online risks from all over the world. Professional hackers develop malware on a global scale and on a 24/7 basis. Hackers have five objectives when spreading malware over the Internet: to infect/distribute, to steal, to persist, to control and for intelligence (Morris, 2010).
Just like a biological virus, a computer virus is able to infect and ruin lives. This malicious software constitutes more than just simple viruses but also includes other types of software including worms, Trojan horses, and ransomware. Malware has been around since the late 1980’s. Originally, people became hackers to gain notoriety online, but today, it has become more of a business. Cyber attacks originate from all around the world, and it is not just individual people that benefit from it. In two decades, numerous cyber crime syndicates have been created, and states all over the world sponsor hacker groups. Over the past twenty-five years, malware has become less about checking the integrity of computer security and gaining notoriety in the underground cyber society, and it has become more of a chaos creating, money making business that many people and institutions take part in.
In today’s world, we are all in some way connected to or involved with the internet. We all use different services that we feel either enrich our lives or make them more enjoyable every day, from email to FaceBook, MySpace, and e-commerce. We all take a sort of false comfort in the basic anonymity of the internet; however, when we think about it, that could end up being the single biggest risk to our own safety today. When we typically think of crimes committed against us, we could probably name several: mugging, theft, scams, murder, and rape. For these, things we all take as many necessary steps as we can to help lower the chances of them happening to us because they are on the forefront of our minds. However, most of us don’t take the
In accordance with many decades of cyber evolution, a cybercrime is shown in different ranges of crimes, which depend on the spread of technology and law. From the introduction of computer in the 1960s to the rise of personal computer in 1980s, cybercrime began to appear. The crimes can vary from piracy of software to patent-related crimes. This caused a surge in the introduction of relevant legislation in many countries and international organizations involved. In late 1990s, when Internet and transnational crimes were born, the international community cooperated in many instances such as the passing of the UN General Assembly Resolution 45/121 in 1990 and the manual for the prevention and control of computer-related crimes issued in 1994. Despite all the
Network viruses are another favorite method of cyber criminals. As we all know, viruses can bring a network to
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).
Their operations are very slick and swift such that stolen data is quickly exploited within seconds of being submitted by unsuspecting victims. Since 2005, over 400,000 databases have been compromised since 2005, and thousands more have gone unnoticed or reported. About 40 percent of those involved in IT security have no fixed figure on the number of hackings their companies have experienced. One of the rapidly increasing areas of ecommerce is in the use of web-based applications to replace traditional over-the counter transactions. Hackers have expectedly, latched on. According to a study by Gartner, over 75 percent of Internet security breaches are due to flaws and loop holes in software. The reason for this is that, applications are normally designed and put together quickly to get the system running, and no time is spend analyzing and assessing security implications. As computer hackers continue to step up their operations in line with technology advancements, the securities and future industry recorded a 150 percent increase in the number of suspicious activities detected by their systems. During the same time, research carried out at the University of Maryland indicated that a computer connected to the Internet was subject to an attempted hack every 40 seconds. The battle between ecommerce websites and consumers wages on, according to an independent analyst, ‘consumers are losing a tug of war.’ Simon Smelt, an economist who runs a survey company