Using the Internet for Computer Crimes

1448 Words3 Pages

Modern technology has laid the track for criminals. Many criminals have jumped on the train of cyber crimes by using the internet. Cyber crimes allows criminals to act fast and get instantaneous satisfaction, yet allows them to feel like they are being anonymous. Cyber crimes usually permits criminals to target individuals, ones finances, or the public, but avoiding these crimes by early detection and more importantly prevention are extremely imperative.

On the internet, there are an abundance of stalkers and predators. However, not all the people who use the internet is classified as a predator or stalker. In larger metropolitan areas the government has specialized units investigating cyber stalking. These specific units investigate and prosecute cyber stalking crimes (Cyber Stalking). Stalkers and predators have many personality profiles; however, once in a while, the police classify them as copy cats. According to National White Collar Crime Center:

The psychological profile of a stalker is that of a person who is somewhat sophisticated (i.e., computer literate) and able to financially support herself. Generally, they are emotionally distant loners who seek attention and companionship in cyberspace and often become obsessed with persons they met while online. (Cyber Stalking)

In most cases, the average person, could be considered as a stalker and or predator; most do not need to be computer literate. The stalker or the predator just needs to be able to know the general basics of using the computer and internet.

Surprisingly enough, defamation or slander is actually a crime where victims can take the wrongdoer to court. “If you defame someone, and you’re found guilty of defamation, civil fines usually apply. This mea...

... middle of paper ...

...b. 18 Feb 2014. .

"Protect your children." Australian Government Interactive . Stay Smart Online - Australian Government Interactive . Web. 18 Feb 2014. .

"2 plead guilty in one of largest child pornography cases in US history." ICE. U.S. Immigration and Customs Enforcement (ICE) - Homeland Security , 17 APRIL 2013. Web. 18 Feb 2014. .

Paul, Stephanie . How is Obscenity Regulated on the Internet?. Legal Zoom , 2007. 93. Print.

"ID Theft, Fraud & Victims of Cybercrime." Online.org. National Cyber Security Alliance. Web. 18 Feb 2014. .

Open Document