tag:blogger.com,1999:blog-55334557504826388462024-02-08T05:50:30.646-08:00Cyber Crime StoryCyber Crimehttp://www.blogger.com/profile/06849264279517338281noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-5533455750482638846.post-82444139712293693532008-01-01T19:48:00.000-08:002008-01-01T19:52:55.263-08:00Cyber Crime Overview<h2><span class="mw-headline"></span><span style="font-size:100%;">Although the term <i>cybercrime</i> is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.</span></h2> <dl><dd><span style="font-size:100%;">Examples of cybercrime which the computer or network is a tool of the criminal activity include <a href="http://en.wikipedia.org/wiki/Spamming" title="Spamming">spamming</a> and criminal <a href="http://en.wikipedia.org/wiki/Copyright" title="Copyright">copyright</a> crimes, particularly those facilitated through <a href="http://en.wikipedia.org/wiki/Peer-to-peer" title="Peer-to-peer">peer-to-peer</a> networks.</span></dd></dl> <dl><dd><span style="font-size:100%;">Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating <a href="http://en.wikipedia.org/wiki/Access_control" title="Access control">access controls</a>), <a href="http://en.wikipedia.org/wiki/Malware" title="Malware">malicious code</a>, and <a href="http://en.wikipedia.org/wiki/Denial-of-service" title="Denial-of-service">denial-of-service</a> attacks.</span></dd></dl> <dl><dd><span style="font-size:100%;">Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, <a href="http://en.wikipedia.org/wiki/Phreaking" title="Phreaking">telecom fraud</a>) and certain financial frauds.</span></dd></dl> <dl><dd><span style="font-size:100%;">Finally, examples of traditional crimes facilitated through the use of computers or networks include <a href="http://en.wikipedia.org/wiki/Advance_fee_fraud" title="Advance fee fraud">Nigerian 419</a> or other gullibility or <a href="http://en.wikipedia.org/wiki/Social_engineering" title="Social engineering">social engineering</a> frauds (e.g., <a href="http://en.wikipedia.org/wiki/Hacking" title="Hacking">hacking</a><a href="http://en.wikipedia.org/wiki/Phishing" title="Phishing">phishing</a>", <a href="http://en.wikipedia.org/wiki/Identity_theft" title="Identity theft">identity theft</a>, <a href="http://en.wikipedia.org/wiki/Child_pornography" title="Child pornography">child pornography</a>, <a href="http://en.wikipedia.org/wiki/Online_gambling" title="Online gambling">online gambling</a>, <a href="http://en.wikipedia.org/wiki/Securities_fraud" title="Securities fraud">securities fraud</a>, etc. <a href="http://en.wikipedia.org/wiki/Cyberstalking" title="Cyberstalking">Cyberstalking</a> is an example of a traditional crime -- harassment -- that has taken a new form when facilitated through computer networks.</span> "</dd></dl> <p><span style="font-size:100%;">Additionally, certain other information crimes, including <a href="http://en.wikipedia.org/wiki/Trade_secret" title="Trade secret">trade secret</a> theft and <a href="http://en.wikipedia.org/wiki/Industrial_espionage" title="Industrial espionage">industrial</a> or <a href="http://en.wikipedia.org/wiki/Economic_Espionage_Act_of_1996" title="Economic Espionage Act of 1996">economic</a> espionage, are sometimes considered cybercrimes when computers or networks are involved.</span></p> <p><span style="font-size:100%;">Cybercrime in the context of national security may involve <a href="http://en.wikipedia.org/wiki/Hacktivism" title="Hacktivism">hacktivism</a> (online activity intended to influence policy), traditional <a href="http://en.wikipedia.org/wiki/Espionage" title="Espionage">espionage</a>, or <a href="http://en.wikipedia.org/wiki/Information_warfare" title="Information warfare">information warfare</a> and related activities.</span></p> <p><span style="font-size:100%;">Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.</span></p> <p><span style="font-size:100%;">One of the recent researches showed that a new cybercrime is being registered every 10 seconds in <a href="http://en.wikipedia.org/wiki/Uk" title="Uk">Britain</a>. During <a href="http://en.wikipedia.org/wiki/2006" title="2006">2006</a> the computer crooks were able to strike 3.24 million times. Some crimes performed on-line even surpassed their equivalents in real world. In addition, experts believe that about 90% of cybercrimes stay unreported.</span></p> <p><span style="font-size:100%;">According to a study performed by Shirley McGuire, a specialist in psychology of the <a href="http://en.wikipedia.org/wiki/University_of_San_Francisco" title="University of San Francisco">University of San Francisco</a>, the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area of <a href="http://en.wikipedia.org/wiki/San_Diego" title="San Diego">San Diego</a>. Her results were presented at the <a href="http://en.wikipedia.org/wiki/American_Psychological_Association" title="American Psychological Association">American Psychological Association</a> conference:</span></p> <ul><li><span style="font-size:100%;">38% of teenagers were involved in software piracy;</span></li><li><span style="font-size:100%;">18% of all youngsters confessed of entering and using the information stored on other personal computer or website;</span></li><li><span style="font-size:100%;">13% of all the participants mentioned they performed changes in computer systems or computer files.</span></li></ul> <p><span style="font-size:100%;">The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earn money. Most teenagers performed illegal computer actions of curiosity, to experience excitement.</span></p> <p><span style="font-size:100%;"><a name="External_links" id="External_links"></a></span></p> <h2><span style="font-size:100%;"><span class="editsection"></span><span style="font-size:85%;"><span class="mw-headline">External links</span></span></span></h2> <ul><li><span style="font-size:85%;"><a href="http://politicalhacking.blogspot.com/" class="external text" title="http://politicalhacking.blogspot.com/" rel="nofollow">Politically Motivated Computer Crime and Hacktivism</a></span></li><li><span style="font-size:85%;"><a href="http://www.infoniac.com/hi-tech/british-cybercrooks-moving-crime-per-seconds-speed.html" class="external text" title="http://www.infoniac.com/hi-tech/british-cybercrooks-moving-crime-per-seconds-speed.html" rel="nofollow">British Cybercrooks Moving at One-Crime per 10 Seconds Speed</a></span></li></ul> <p><span style="font-size:85%;"><a name="Academic_links" id="Academic_links"></a></span></p> <h3><span style="font-size:85%;"><span class="editsection"></span><span class="mw-headline">Academic links</span></span></h3> <ul><li><span style="font-size:85%;"><a href="http://cybercrimes.net/" class="external text" title="http://cybercrimes.net/" rel="nofollow">Cybercrimes.net</a> and <a href="http://steeplemedia.com/blogs/cyb3r_crim3/" class="external text" title="http://steeplemedia.com/blogs/cyb3r_crim3/" rel="nofollow">Cyb3rCrim3.org</a> Susan W. Brenner</span></li><li><span style="font-size:85%;"><a href="http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm" class="external text" title="http://www.jisclegal.ac.uk/cybercrime/cybercrime.htm" rel="nofollow">Cybercrime - High Tech crime</a> JISC Legal Information Service</span></li><li><span style="font-size:85%;"><a href="http://www.lib.msu.edu/harris23/crimjust/cybercri.htm" class="external text" title="http://www.lib.msu.edu/harris23/crimjust/cybercri.htm" rel="nofollow">Criminal Justice Resources - Cybercrime</a></span></li><li><span style="font-size:85%;"><a href="http://information-retrieval.info/cybercrime/" class="external text" title="http://information-retrieval.info/cybercrime/" rel="nofollow">Cybercrime NYLS</a></span></li><li><span style="font-size:85%;"><a href="http://www.cybercrimelaw.org/" class="external text" title="http://www.cybercrimelaw.org/" rel="nofollow">Cybercrime Law</a></span></li><li><span style="font-size:85%;">Council of Europe's Cybercrime Convention <a href="http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm" class="external free" title="http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm" rel="nofollow">http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm</a></span></li><li><span style="font-size:85%;"><a href="http://www.crime-research.org/" class="external text" title="http://www.crime-research.org" rel="nofollow">Computer Crime Research Center</a></span></li></ul> <p><span style="font-size:85%;"><a name="Government_resources" id="Government_resources"></a></span></p> <h3><span style="font-size:85%;"><span class="editsection"></span><span class="mw-headline">Government resources</span></span></h3> <ul><li><span style="font-size:85%;"><a href="http://www.cybercrime.gov/" class="external text" title="http://www.cybercrime.gov/" rel="nofollow">Cybercrime.gov</a> US Department of Justice CCIPS</span></li><li><span style="font-size:85%;"><a href="http://www.us-cert.gov/" class="external text" title="http://www.us-cert.gov/" rel="nofollow">US CERT</a> United States Computer Emergency Readiness Team (US-CERT)</span></li><li><span style="font-size:85%;"><a href="http://www.fbi.gov/cyberinvest/cyberhome.htm" class="external text" title="http://www.fbi.gov/cyberinvest/cyberhome.htm" rel="nofollow">FBI Cyber Investigations Home Page</a></span></li><li><span style="font-size:85%;"><a href="http://www.ustreas.gov/usss/financial_crimes.shtml#Computer" class="external text" title="http://www.ustreas.gov/usss/financial_crimes.shtml#Computer" rel="nofollow">US Secret Service Computer Fraud</a></span></li><li><span style="font-size:85%;"><a href="http://onguardonline.gov/index.html" class="external text" title="http://onguardonline.gov/index.html" rel="nofollow">On Guard</a> OnGuardOnline.gov</span></li><li><span style="font-size:85%;"><a href="http://www.consumer.gov/idtheft/" class="external text" title="http://www.consumer.gov/idtheft/" rel="nofollow">ID Theft</a></span></li><li><span style="font-size:85%;"><a href="http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html" class="external text" title="http://www.findlaw.com/01topics/10cyberspace/computercrimes/index.html" rel="nofollow">FindLaw Computer Crime</a></span></li><li><span style="font-size:85%;"><a href="http://www.rcmp-grc.gc.ca/scams/ccprev_e.htm" class="external text" title="http://www.rcmp-grc.gc.ca/scams/ccprev_e.htm" rel="nofollow">RCMP Computer Crime Prevention</a> Royal Canadian Mounted Police</span></li><li><span style="font-size:85%;"><a href="http://www.dc3.mil/" class="external text" title="http://www.dc3.mil" rel="nofollow">Department of Defense Cyber Crime Center</a></span></li></ul> <p><span style="font-size:85%;"><a name="Commercial_resources" id="Commercial_resources"></a></span></p> <h3><span style="font-size:85%;"><span class="editsection"></span><span class="mw-headline">Commercial resources</span></span></h3> <ul><li><span style="font-size:85%;"><a href="http://www.e-crimecongress.org/" class="external text" title="http://www.e-crimecongress.org" rel="nofollow">Annual e-Crime Conference</a> : International Conference for Public & Private Security Specialists</span></li></ul> <p><span style="font-size:85%;"><a name="Further_reading" id="Further_reading"></a></span></p>Cyber Crimehttp://www.blogger.com/profile/06849264279517338281noreply@blogger.com0