Crime on the Internet

Good Essays
Crime on the Internet

Created to be a military intelligence weapon by the US Defense Department, the Internet is now a vast mediocre commodity. The Internet is a publicly accessible computer network connecting many smaller networks from around the world. Therefore, people from every corner and crevice of the world can be found on the web. The Internet is becoming an increasingly popular form of entertainment and supplements the television. People of all types go online to entertain themselves, keep up to date with the news, and now with e- commerce, conduct their business. However, anything that appears to be too good is usually just that. "People of all types" includes the opportunistic criminals of the world whom look only to benefit themselves at the expense of other's lives, misfortune, and misery. With good intentions the internet can be a safe place, but the Internet can also be used as a mediated channel of communication in which criminals can research, conduct, and conceal their crimes with little or no resistance from security. It is a channel that has given birth to a new breed of criminals that have only just begun to uncover the depths and horrifying potential of cyber crime.

The Internet is immensely vast. With little effort one can find information on anything online. Not only can one find information on anything, often times a web surfer can interact with other surfers by means of instant messaging, chat rooms and talk forums. Although this interaction sounds innocent enough, in "Netcrimes" (1998) David Mann and Mike Sutton state that, "Criminals can exchange information in newsgroups that advise others on how to commit crimes." this means that new techniques and skills can be shared by c...

... middle of paper ...



1. Cesare, K (2001) "Prosecuting Computer Virus Authors": University of the Pacific, McGeorge School of Law, spring 2001. Retrieved November 6th ,2001 from Lexis-Nexis Academic Universe Database

2. Mann, D,. Sutton M,. (1998) "Netcrimes: More Changes in the Organization of Thieving": British Journal of Criminology, Spring 1998 vol. 38 pg. 201-229. Retrieved November 5th, 2001 from Expanded Academic ASAP Database

3. Michaud, S (2001) "Cyber Killer": Maxim Magazine issue 46, pg. 152-164

4. Schneirer, B (2000) "Semantic Network Attacks": Communications of the ACM, December 2000 vol. 43 pg. 168-? Retrieved November 5th 2001 from Expanded Academic ASAP Database.

5. Smith, g (2001) "A Constitutional Critique of Carnivore": Loyola of Los Angeles Law Review: Retrieved November 6th, 2001 from Lexis-Nexis Academic Universe Database