high tech (cyber) crimes
TRANSCRIPT
HIGH TECH (CYBER) CRIMES
Elizabeth HallKaplan University
CJ216-07Erik Bernholdt
5.18.10
TYPES OF CYBER CRIMES
Cyber Vandalism/Computer Crimes
Technology CrimesCyber Theft/Computer Related
CrimesCyber Warfare(Siegel, 2010)(Foster, 2000)
CYBER VANDALISM
Computer Crime in which the computer or the performance of the
computer is attacked
Carried out through the computer for malevolent intent, vengeance, or damage
(Siegel, 2010)(Foster, 2000)
TYPES OF CYBER VANDALISMWorms- usually spread through e-mails, attaches itself and
resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network
computers.
Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and
hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its
own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information
(Siegel, 2010)(Foster, 2000)
TYPES OF CYBER VANDALISM 2
Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending
threatening e-mails etc.
Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly
This crime generally means malicious or harmful actions directed at computers or persons via internet
(Siegel, 2010)(Foster, 2000)
TECHNOLOGY CRIMES
Technology used in crime commission other than computers themselves- includes software
These crimes often affect the elderly through phone scams promising large cash prizes after giving up
personal information such as bank account numbers, or social security numbers.
(Siegel, 2010)(Foster, 2000)
TYPES OF TECHNOLOGY CRIMES
Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for
deceptive purposes such as promises of fake charities or prizes designed to illicit personal
information and money from people
Software Piracy- illegal downloads of software from the internet
(Siegel, 2010)(Foster, 2000)
TYPES OF TECHNOLOGY CRIMES
Shoplifting SoftwarePhysically stealing hardware
for resale or information Theft of cable services
(Siegel, 2010)(Foster, 2000)
TYPES OF TECHNOLOGY CRIMES 2
Duplicating Software
Selling duplicated software via internet or otherwise
This crime generally means using technology other than computers in commission of crime
(Siegel, 2010)(Foster, 2000)
CYBER THEFT
Use of the internet in the distribution of unlawful materials for profit or to commit
fraud for swift revenue returns
These crimes promote child pornography, and perpetrators swindle millions of dollars a year
from innocent people while remaining anonymous.
(Siegel, 2010)(Foster, 2000)
TYPES OF CYBER THEFT
Computer Fraud- includes theft of information, software, manipulation of bank
and credit card accounts, and corporate espionage
Unlawful distribution of pornography or drugs for profit
Denial of Services Attack- used to annoy or extract money from web users by
preventing access to service (Siegel, 2010)(Foster, 2000)
TYPES OF CYBER THEFT 2
Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file
sharingInternet securities fraud
Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information
(Siegel, 2010)(Foster, 2000)
TYPES OF CYBER THEFT 3
Phishing- duplicating legitimate websites in order to obtain personal information
E-tailing- illegal buying selling products via internet using fraudulent receipts
(shoplisting) and switching codes on merchandise for refunds
(Siegel, 2010)(Foster, 2000)
CYBER WARFARE
Cyber crime in which perpetrators have political motives attached
These crimes may involve computer network penetrations on military bases, defense
contractors, and aerospace companies. The goal is to embezzle vital data and information
(Siegel, 2010)(Foster, 2000)
TYPES OF CYBER WARFARE
Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the
internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the National Security Agency, and nuclear weapons lab.
Can also be used to attack electric power and essential services
(Siegel, 2010)(Foster, 2000)
CONTROLLING CYBERCRIME
The growing phenomenon of cybercrime is causing a whole new set of laws and law
enforcement processes.This causes numerous challenges for law
enforcement, because technology changes so rapidly it is hard to keep up with the
training
(Siegel, 2010)(Foster, 2000)
CONTROLLING CYBERCRIME 2
Some of these challenges include: Global nature of cybercrime
High tech crimes are often misclassified causing Statistical information to be skewed
Allocation of funds usually favors traditionalcrimes because of skewed statistics
Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR
(Siegel, 2010)(Foster, 2000)
REFERENCES
Foster, R.E. (2000). Police Technology. Upper
Saddle River: Pearson Prentice HallSiegel, L.J. (2010). Criminology: Theories,
Patterns, and Typologies. Tenth Edition. Belmont:
Wadsworth Cengage Learning.