Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Disadvantages of technology in crime
The problem of rising cyber crimes
Cyber crime essay
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Disadvantages of technology in crime
In today’s world everyone is online and as everyone has moved into the cyber world so have the world’s criminals. What was invented as a way for scientists to do research in remote locations has become a metaphoric playground for the lawless. The internet a place where we all go in our down time; where Facebook, YouTube, Twitter, and Pinterest all live is a wonderful and amazing technological break though that has completely modeled our existence today, but there is a dark side to the internet the “dark net” (Gerdes). Cyber-crime is quickly becoming the hottest mechanism of crime in the world. Some of the ways that cyber-crimes are replacing traditional crimes are like burglary being replaced by hacking into networks or private computers, phishing for information online instead of deception calling, internet extortion instead of physical extortion, and online fraud as opposed to face to face fraud.
In the beginning hackers hacked into computers and networks out of curiosity or for fun, but more recently they have been caught using their skills for personal financial gain (Stein). Hackers who use the skills for crimes are sometimes referred to as black hatters and the hackers whom are working for good, such as working for law enforcement, are referred to as white hatters (Chamelin475). Six months into the year 2010 cyber-crimes had jumped from sixty million to one hundred-eighty million cyber-crime cases (Chamelin475). One of the most popular forms of cyber intrusion is through malware or malicious software. Malware is any software with the intentions of blocking computer use remotely, to covertly steal computer data, to secretly intercept computer data, or to subvert the transmission of data for personal profit. Most malware is...
... middle of paper ...
... cyber-crimes division will be there to protect the rest of us while we are online.
Works Cited
Chamelin, Neil C., and Leonard Territo. "Cybercrime." Criminal Investigation. By Charles R. Swanson. New York: McGraw-Hill Higher Education, 2012. 472-87. Print.
Gerdes, Louise I. Cyber Crime. Detroit: Greenhaven, 2009. Print.
Stein, Richard Joseph. Internet Safety. New York: H.W. Wilson, 2009. Print.
FBI. FBI, 17 Mar. 2010. Web. 30 Apr. 2014. .
"United States Secret Service: Electronic Crimes Task Forces and Working Groups." United States Secret Service: Electronic Crimes Task Forces and Working Groups. N.p., n.d. Web. 30 Apr. 2014. .
2012 Crime Report. Rep. N.p.: n.p., n.d. Internet Crime Complaint Center, 2012. Web. .
In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.
When you think of the internet, usually what first comes to mind is social networking, online marketplaces, and other places that don’t sound that bad. Look deeper and you’ll find that the internet isn’t as nice as you thought it was. This “dark side” of the net is comprised of everything looked down upon in the real world – drugs, weapons, false identities, and even hit men for hire exist in this rough-and-tumble darknet. Not just physical products, but virtual products float around as well; from term papers to file sharing and even e-currency populate this dark area.
Malware, short for malicious software, is wide-spread in today’s computer market. Malware is software intended to gain sensitive information or access to a victim’s private system (“Who Creates Malware and Why?” par. 13). Many forms of malware exist: the major categories including viruses, ransom ware, worms, keyloggers, trojan horses and rootkits. Today, malware is most commonly used to steal victims’ personal information for financial gains, but malwares’ attention was not always this way. The first computer worms were written as harmless pranks.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
Technology has opened new encounters and opportunities for the criminal justice system. There are so many new practices of criminal activity, such as computer crimes. There are different types of computer crimes that many people become victims of every day. Computer crime is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target ("Computer Crime: Chapter 2: What Are the Crimes?", n.d.). Crimes such as data diddling, pump and dump, social engineering and spoofing are computer crimes. Even though these crimes are difficult by privacy issues, the new technology has made investigations and prosecutions well organized and effective. Though views are different on the pros and cons of specific technological changes in the criminal justice system, there is an agreement the system has changed affectedly ("Effects of Technology in Criminal Justice | eHow", n.d.).
Computer crimes are often heard a lot about in the news. When you ask someone
“A hacker is someone with deep knowledge of and great interest in a system. A hacker is someone who likes to delve into the inner workings of a system to find out how it works.”2 The definition of a hacker has been skewed in recent years by the press to connotate people who break into computer systems. The term has also evolved to represent people who protect computer systems and those that break into them. These newly termed hackers can be classified into three categories white-hat, black-hat, and gray-hat hackers. White-hat hackers are employed by corporations and work on the good side to secure computer systems without breaking into them. Black-hat hackers work on the bad side and attempt to compromise systems in illegal ways. Gray-hat hackers occupy the gray space of hacking and break into systems to learn and expose flaws, often as a service to the computer community. The ethical line dividing white-hat hackers and black-hat hackers is clear. However, the line that separates gray-hat hackers from black-hat hackers is constantly shifting in the new global network. Hacking that may have been considered ethical yesterday may not be true today due to the impact on global systems in the form of dollars loss and downtime.
McQuade, Samuel C. "research on cybercrime." Issues: Understanding Controversy and Society. ABC-CLIO, 2011. Web. 21 Jan. 2011
Crime theories are often used to understand and explain criminal behaviour. Using crime theories in the field of criminology allows criminologists to apply an understandable explanation of why an offender has committed a crime, and what may have influenced the act (Mazerolle 2015). A variety of explanations for crime exists through a range of theories. Routine activity theory, a psychological perspective, provides an ecological approach to what causes crime, and focuses on the environmental situation, which might encourage and facilitate crime (Akers 1994). Whereas, social learning theory, an interactionist perspective, focuses on the social environment, and how individuals are constantly observing different behaviours and learning from them (Mazerolle 2015). These theories can be used to examine internet crimes such as online child exploitation. This crime is an international problem
state and boundary lines currently poses a challenge for law enforcement. When a cyber-crime is
Cybercrimes are on the rise now. People information are constantly getting hacked. Target computers were recently hacked and over a thousand people credit card information was stolen. Every day we
Today in present, with the improvements in technology and science new concepts are integrated in our lives. Cyber crime is among those concepts that did not exist 15 to 20 years ago. In the old days only conventional crime was discussed, which refers to those traditional, illegal behaviors that most people think of as crime. In today one has to be careful not only against conventional crime but also cybercrime also known as “faceless crime” it’s the latest and the most complicated problem in the new century. Cybercrime consists of all criminal actions against communication devices in a network such as Internet, telephone lines or mobile network. Cyber crime can be observed among people at various age groups as it is easier to commit compared to other types of crime like murder, kidnapping or human trafficking.
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J. & Liederbach, J., 2006, Digital Crime and Digital Terrorism, 1st Edition, New York: Pearson Education, Inc.
There are different groups, from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed. The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world.