Cyber Crime Essay

3862 words - 16 pages

Cyber Crime
Erika Moore
CRJU 5500-02F

What is cybercrime and how can someone get caught in participating in a cybercrime? Cybercrime any kind of crime committed via the internet or on a computer network.  Cybercrime can be anything from hate crimes, telemarketing and Internet fraud, identity theft, to credit card account thefts. All are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet.
How bad could cybercrime really be? “Cybercrime is a type of crime that not only destroys the security system of a country but also its financial system.” (Real Cost of Cyber Crime) Cybercrime is the type of crime that is hard to ...view middle of the document...

Other cybercrimes like telecommunication piracy, offensive material dissemination, and other cyber frauds also belong to this category. The person who changes the source code on the website or any computer program also known as a computer source document tamper will get a punishment up to 3 years of imprisonment or fine. The individual who hacks the computer or computer devices will get an imprisonment up to 3 years or a fine. An act of trying to gain access to a system which is a protected system by the government, will result in imprisonment for 10 years and a heavy fine.” (Real Cost of Cyber Crime) They came out with an Act in 2000 called the Information Technology Act-2000 showing the different penalties for the different cybercrimes.
What makes cybercrime laws so difficult to enforce? Before anyone can discover what crime has been committed they have to determine where and who the criminal is before they can even make an arrest. (What Makes Cybercrime Laws so Difficult to Enforce) This is the major problem with online crime because there is so many ways to hide one’s identity. With all the different IP addresses bouncing off the different towers all over the world it makes it very difficult to track down and find the criminal. After finding out where the cybercrime was committed, they have to determine whether a crime has taken place. After determining that the next step is to determine which law was violated, was it a city ordinance, a state statute, or a federal law. Finding out what geographic jurisdiction is the hardest part because laws differ from state to state and nation to nation. The jurisdictional issue slow down or completely block the enforcement of cybercrime laws. (What Makes Cybercrime Laws so Difficult to Enforce) However, there are attempts being made to help better track online identity. Now we have plenty of laws in books enforcing the matter of cybercrime, but enforcing them is another matter.
In Las Vegas tens of millions of dollars in financial fraud losses each year were attributed to the group of sophisticated criminals. A guy named Carder. Su hosted exclusive websites from Russia where the international members could come together on an online market place to buy and sell stolen identity information such as credit cards and driver’s licenses and they would carry out high-tech fraud schemes. In 2012 the Nevada U.S. attorney’s office obtained four separate indictments charging fifty-five members and associates, including the groups in Russia, in a sweeping racketeering and identity theft conspiracy. The indictments were a result of a four and a half year investigation code name “Operation Open Market”. “The investigation identified large scale trafficking of compromised credit card account data and counterfeit instruments (counterfeit identifications and counterfeit cards), as well as money laundering, narcotics trafficking and various types of computer crime,” (Massive Cybercrime Case Unfolding in Las Vegas)...

Other Papers Like Cyber Crime

Cyber Crime Team Essay

1543 words - 7 pages Cyber-Crime Article Analysis Team D June 12, 2013 CJA/394 Cyber-Crime Article Analysis Cyber-crime is an increasing type of crime locally and globally. Cyber-crime is defined as, “criminal activity or a crime that involves the Internet, a computer system, or computer technology,” ("Cyber-crime," 2012). Law enforcement, courts, and corrections are affected in different ways by cyber

Introduction to Cyber Crime Essay

1950 words - 8 pages CYBER CRIME IN ITS VARIOUS FORMS Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to

Cyber Crime- Online Predators

2467 words - 10 pages Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators

Cyber Crime Law

4481 words - 18 pages other similar devices. It also includes computer data storage devices or media. (h) Without right refers to either: (i) conduct undertaken without or in excess of authority; or (ii) conduct not covered by established legal defenses, excuses, court orders, justifications, or relevant principles under the law. (i) Cyber refers to a computer or a computer network, the electronic medium in which online communication takes place. (j) Critical

Cyber Crime in the World

1824 words - 8 pages CYBER CRIME Daniel L. Doyle Excelsior College Computer technology has brought us into an era that is no longer controlled by man but instead is reliant upon computers due to their inconceivable capabilitiesComputer technology has brought us into an era that is no longer run by man but instead is dependent on computers due to their incredible capabilities. Ross, Staples, and Udall (2009) noted one of the many approaches

Computer Forensics and Cyber Crime

701 words - 3 pages Computer Forensics and Cyber Crime Author Institution Computer Forensics and Cyber Crime A security survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution

Cyber Crime

1364 words - 6 pages the heist was accomplished could possibly leave the institutions at the mercy of further attacks. However, the overwhelming online consensus points to SQL Injection as the method most suitable for this form of cyber-attack. [2] Structured Query Language (SQL) is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS). Databases form the backbone of all financial

Cyber Crime

1235 words - 5 pages Argumentative Essay -DISCURSIVE ESSAY COMPUTER CRIME When people hear the word computer crime, they often think of some bad pictures from the Internet that show crimes involving computers. Those tapes of crime are no different from crimes without computers. The computer is only a tool that a criminal uses to commit a crime. There are no precise, reliable statistics on the amount of computer crime and the economic loss to

Cyber Crime Law

3784 words - 16 pages Oriental Journal of Chemistry Vol. 26(4), 1353-1360 (2010) The potential of seaweed liquid fertilizer on the growth and antioxidant enhancement of Helianthus annuus L. N. AKILA and T. JEYADOSS* Department of Chemistry and Biosciences, Srinivasa Ramanujan Centre, SASTRA University, Kumbakonam - 612 001 (India). (Received: September 03, 2010; Accepted: October 11, 2010) ABSTRACT A field experiment was carried out during the chithiraipattam

Letter to the Editor

642 words - 3 pages The National Crime Prevention Council. Cyber Bullying Huffman, Jan. ( 2010 June, 27) How Should School Handel Cyber Bullying. New York Times. Retrieved From

Cyber Security: Cyber Terrorism

1810 words - 8 pages terrorism will be vital. Such a situation will make it is easier for anti-cyber terrorism authorities to develop effective applications that could detect cyber terrorism. For example, the decision to set up a cyber space security apparatus by former president Bush was ambiguous. This is because such an office could not be effective towards cyber terrorism because it had other duties such as fighting other forms of cyber crime. The indication here is

Related Essays

Cyber Crime Essay

1366 words - 6 pages CYBER CRIME Presented by : GROUP 3 CONTENT • • • • • • • • • • Introduction History of cyber crime Definition Categories of cyber crime Types of cyber crime Cybercrime statistics Cyber Threat Evolution Cyber crime in Philippines Safety tips Conclusion WHAT DO YOU KNOW? INTRODUCTION • Cybercrime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity

Cyber Crime Essay 647 Words

647 words - 3 pages Topic Outline Crime and Cyber Risk RMI 4300-Klein Distinctive Features of Crime Risk Common Crimes • Burglary • Robbery • Shoplifting • Fraud • Embezzlement • Forger and Counterfeiting • Vandalism • Arson • Espionage • Computer Crime Fraud • Fraud involves inducing another to act to his or her detriment. • Examples of fraud • A merchant collects payment in advance for good that will not be delivered or will be greatly inferior

Cyber Crime Essay 3407 Words

3407 words - 14 pages ...................................................................................................................... 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3

Cyber Crime Essay

1335 words - 6 pages “Cyber-crime,” which refers to any criminal activity committed with the aid of or in the arena of the Internet and similar telecommunications, is both a new incarnation of old crimes through a new medium, and a unique entity all its own. It differs from physical crime in four ways. It is easy to commit, requiring minimal resources for great potential damage, being committable in a jurisdiction in which the perpetrator is not physically present