Cyber Criminals: Cyber-Crime and Cyberstalking

1424 Words3 Pages

People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in people’s lives that is not heavily inspected for weaknesses, however. Computers offer criminals a wide range of crimes with smaller risk and no physical harm. These crimes have a huge impact on society because of the end results. Hackers can cause companies thousands or millions of dollars, as well as targeting individual people. On a different level, stalkers can leave long term effects on their targets and get away with it effortlessly. Additionally, identity theft is causing people millions of dollars and there are very few ways to track people down. All of these crimes can be done by any person in almost any location. Cyber-crimes negatively affect society due to hacking, stalking, and identity theft.

Criminals develop along with technology. Once the Internet came out, people found ways to exploit it. For example, a man named John Draper was able to use a cereal box toy to access AT&T’s network. The pitch indicated to the phone company that a call was ready to be made and he was able to use their system for free. In another case Kevin Mitnick, wanted by the FBI for hacking, was able to access a computer learning system and change documents. This attack caused millions in damages and was done for personal motives. (James). “Cyberattacks have grown more...

... middle of paper ...

...010466208&source=gale&srcprod=OVRC&userGroupName=glen39253&version=1.0>.

Roddel, Victoria. "Cyberstalking." Cyber Criminals Most Wanted Website. Web. 09 Nov. 2011. .

Moscaritolo, Angelina. “More than 100 Charged in ID Theft Ring.” Www.scmagazineus.com. 10 Oct. 2011 Web. 27 Oct. 2011. .

James, Randy. “A Brief History of Cyber Crime.” Editorial. Time Magazine 1 June 2009. Www.time.com. 1 June 2009. Web. 27 Oct. 2011. .

Sengupta, Somini, “Case of 8,000 Manacing Posts Tests Limits Of Twitter Speech.” New York Times 26 Aug. 2011. Web. 26 Oct. 2011 .

More about Cyber Criminals: Cyber-Crime and Cyberstalking

Open Document