Free Sample: Internet crime paper example for writing essay

Internet crime - Essay Example

Crime and Criminal Behavior Internet Crime Hanson, B. , Reins, B. , & Fisher, B. (2011). Internet crime. In W. Chambers (De. ), Key Issues in Crime and Punishment: Crime and criminal behavior. (up. 155-168). Thousand Oaks: SAGE publications, Inc. Dot: 10. 4135/9781412994118. Non Billy Hanson, Bradford W. Reins, Bonnie S. Fisher The birth of the information age brought with it changes far beyond the scope of human imagination. Technological developments such as video cameras, cellular phones, and computers have changed the way people think and act.

One of the most monumental technological advances in the history of humankind was the placement of the Internet. The Internet is a series of interconnected networks that allow for electronic communication and information sharing all over the world with the use of capable electronic devices. The Internet is the name given to the main system of networks; however, there are numerous Internet systems. Also, the term Internet is often mistakenly used interchangeably with the term World Wide Web.

Internet refers to the actual network, while World Wide Web refers to a series of interconnected electronic documents that can be searched for and shared on the Internet. Unfortunately, while the Internet has revolutionized communication, business, academia, retail, and almost every other industry, it has also created opportunities for crime. The advancement of technology such as the Internet has provided individuals and organizations with a means to both commit new types of crimes and adopt new methods of committing traditional street crimes.

From online identity theft to cabinetmaking to viruses, millions of people worldwide are affected by online deviant behavior every day. Internet crime is quickly becoming one of the biggest and most threatening problems for both law enforcement and the public at large. Legal approaches have been developed throughout the history of the Internet to address the different types of Internet crime. Various arguments, both pro and con, have arisen surrounding this complex issue. Defining Internet Crime The birth of Internet crime brought with it a slew of terms-?including technology crime, information crime, intellectual crime, and online crime.

As a result, there is often confusion as to the exact definition of Internet crime. To understand what Internet crime is, it is necessary to understand what it isn’t. Internet crime is often incorrectly referred to as computer crime. Computer crime is any illegal activity that is perpetrated through the use of a computer. Internet crime, on the other hand, is any illegal activity perpetrated on an information network, such as the Internet. Though the two may overlap, they are not the same. For example, making illegal copies of a CD would be considered a computer crime, as a computer is necessary to perform the action.

However, if one were to illegally download music from the Internet, this act would be considered an Internet crime, as use of the Internet or other information network is necessary to perform the download. While a computer rime may involve the Internet, the Internet is not necessary; while an Internet crime may involve a computer, a computer is not necessary. Often, during the examination of online deviance, the term cybercafé is used. Cybercafé refers to any illegal activity that occurs in the virtual world of cyberspace. Most researchers use it interchangeably with Internet crime.

Internet crime can be divided into two main categories: Internet-assisted crime and Internet-based crime. An Internet-assisted crime is one in which the Internet or other information network was used, but not required, to commit the crime. Internet-assisted crimes can be committed offline, such as during identity theft or fraud, but are ever more frequently being committed online. In fact, according to the Federal Bureau of Investigation, online identity theft and fraud are quickly becoming two of the most prolific crimes in the world. 1 Internet-based crimes are those that exist and proliferate solely due to the presence of the Internet.

Hacking and phrasing are common examples of Internet-based crimes. Hacking is most often considered the act of breaking through or surpassing a Website or network’s online security systems. This process could be performed to steal or alter information, or even simply to show off an individual’s computer skills. While hacking has noncommercial meanings, it is the negative connotations that are most frequently used. The term phrasing refers to a process through which the programming code or entire files are altered on a computer or network server to redirect users from legitimate Websites to unauthorized cloned versions.

In many cases, this process is used to steal a user’s personal information, such as passwords or surnames. There are certain crimes that fall into both categories of Internet rime. For example, cabinetmaking can be either an Internet-assisted crime or an Internet-based crime, depending on the offender’s actions. If an individual is following, contacting, and/or harassing someone offline, in addition to online contact, then his/her actions could be considered Internet-assisted stalking. However, if the pursuit behavior originated and is limited to online activities, then his/her actions could be considered Internet-based stalking.

While the two versions of cabinetmaking are legally considered the same by law enforcement, the need and ability to preferential between the two has become a topic of debate among criminologists, as effectively understanding the difference allows prevention efforts to be tailored to address specific aspects of each form. History of Internet Crime The origins of the Internet can be traced back well over several decades to the early sass. Originally developed for military and educational applications, interlinked computer networks were designed to allow individuals and working groups to store and share information quickly and efficiently.

The Internet and World Wide Web became accessible for public-wide use in the late sass. The first semblance of the modern Website appeared around 1990. Since that point, the number and size of files, networks, and Websites have grown exponentially. By 2009, several sources placed the estimated number of Websites at almost 200 million and the number of Internet users at well over 1. 5 billion. The ambiguous nature and lax security measures of early information network systems make it nearly impossible to know when the first Internet crime actually occurred.

As a result, the only method of examining the history of Internet crime is to focus on case studies. Given the numerous types of Internet crime, however, a review of all the major cases would not be possible in a compressed discussion. However, a few of the first, more well-known incidents can provide a snapshot of early Internet crime. One of the first documented Internet crimes occurred in the late sass. A teenaged boy named Kevin Nitpick was caught by police after hacking into a phone company’s digital network.

Though the Internet as it is known today did not exist at that time, it was possible to use a modem to dial into information networks through phone lines. By remotely accessing the phone company’s network, Nitpick was able to make free alls, as well as eavesdrop on others’ calls. Though this may not be considered an Internet crime in the traditional sense, it would only be the first of Nitpicks illegal online activities, leading him to become one of the most famous hackers of all time. Hackers remained the central target of Internet crime prosecution for the last two decades of the 20th century.

In the early sass, it became evident to law enforcement that hackers were not the only people using the Internet for criminal activities. While working on cases of missing and abducted children, FBI agents found one of the first online child pornography rings. It was discovered that pedophilia were using the Internet to share sexually explicit images of children. Further, pedophilia were also using electronic bulletin boards (early precursors to chat rooms) to contact underage individuals in an effort to solicit sexual activity. With this discovery, the FBI began the Innocent Images National Initiative.

Since 1995, FBI agents have been going undercover on Websites, blobs (a Website where users can Journal their thoughts), and chat rooms in an effort to catch child predators. Their efforts have resulted in the arrest and conviction of almost 7,000 offenders in the United States. Although email programs technically existed before the Internet, they were not used with any widespread regularity until the mid to late sass. During that time, programs like Microsoft Outlook were developed, and new companies, such as America Online, began offering free email accounts.

As a result, the number of email users grew exponentially to an estimated 100 million by 2000. With the explosion in email use came another explosion-?email spam, which is any unsolicited, bulk email sent out to a large number of email users. Spam emails may be advertisements, special offers or, most often, some type of scam. Though they were used somewhat during the early sass, the Nigerian solicitation scam, or 419 scam, became notorious during the sass. These fraudulent emails most often claim to be from a Nigerian prince or businessman who needs assistance transferring a large amount of money out of the country.

Email users are asked to provide either their bank account information or a fee in exchange for a portion of the money. After a series of communications and interactions in which participants are strung along, the victims end up losing their money and receiving nothing in return. According to the Internet Crime Complaint Center (ICC), in 2002, the median amount lost as a result of these scams was $5,575 per reported victim. In January 1999, one of the first cases of cabinetmaking was prosecuted in California. Gary Talented spent the better part of 1998 terrorizing a woman who rejected his advances.

Posing as the woman, Talented placed ads and messages on several different Websites and online bulletin boards describing “her” rape fantasies. He also posted her address and directions on disabling her home alarm system. Tallness’s actions led to at least six men visiting the woman’s home, with the intent of fulfilling her purported rape entities. The situation became dire when Talented began posting ads stating that the woman’s negative responses to visitors were simply part of her fantasy. Talented was arrested and charged with using the Internet to stalk and solicit rape, and was sentenced to six years in California state prison.

Accessibility In October 2006, the world was introduced to a new type of crime known as accessibility. Similar to cabinetmaking, accessibility is typically described as continued harassment and torment with the use of an electronic communications device, most often via the Internet. The main difference is that accessibility most fete involves adolescents as victims and/or offenders. While accessibility had been discussed long before October 2006, it was the case of Megan Meier that really brought it to the attention of the American public.

Earlier that year, 13-year-old Megan Meier befriended whom she thought was a teenage boy named Josh on Namespace. For a while, the correspondence was mutually friendly, as the two exchanged flirtatious messages. However, events suddenly took a turn for the worse when Josh, along with several other teenagers, began posting very derogatory comments about Megan. One night, the insults pushed Mean’s already fragile lifestyle to the breaking point, and she took her own life. The case took another strange turn when it was discovered that “Josh” didn’t actually exist.

Instead, the account was created by Lori Drew, the mother of one of Mean’s friends and one of her coworkers. Her reason for creating the profile and initiating contact was because Megan and her daughter had gotten into a fight, and she wanted to unearth what Megan was saying about her daughter. Though Mean’s parents demanded that Drew be prosecuted, there were no statutes in their home state that prohibited accessibility. Drew was eventually convicted of three misdemeanors charges of imputer fraud under the Computer Fraud and Abuse Act, but the case was later overturned because the statute was deemed too vague.

As a result of that case, accessibility is a topic of interest among researchers, reporters, and lawmakers. In fact, numerous states have modified their harassment laws to include harassment via the Internet. In those states, accessibility is now being prosecuted under the harassment statutes. Types of Internet Crime There is no universally accepted typology of Internet crimes. At a basic level, these types of crimes can be divided into four general categories: online assault, online raid, online theft, and online intrusion. Several specific types of Internet crime exist within each of these basic categories.

While published estimates on the extent of each type of Internet crime are few, and change daily, available information suggests that each of 3 these crimes are growing in scope (in terms of number of victims, number of offenders, and cost). These four categories of Internet crime and some of the more common types of Internet crimes within these categories are defined. Online Assault Online assault involves violence perpetrated via the Internet, such as threats or unwanted sexual advances that result in an emotional response on the part of the victim (e. G. , feelings of worry or fear).

Types of online assault include: accessibility, cabinetmaking, and online sexual exploitation of children. Accessibility: This type of crime occurs when minors use Internet-capable devices to repeatedly harass, tease, or torment other minors. The age of the perpetrator and victim set this crime apart from cabinetmaking, which involves adults instead of minors as victims/offenders. Cabinetmaking: This is a crime of repeated (I. E. , occurring on two or more occasions) unwanted contact, harassment, sexual advances, or threats of violence using interpersonal communications technologies (TIC).

Most often, cabinetmaking involves use of the Internet; however, it may also be perpetrated offline using other electronic communications devices, such as cell phones. Cabinetmaking can also involve attempts on the part of the offender to damage their victim’s identity, bring them harm, annoy the victim by signing them up for email bombs, or damage their victim’s computer data or equipment. Cabinetmaking can arouse emotional responses in victims, such as fear or annoyance; however, state statutes vary as to whether such cacti responses are necessary before the determination that cabinetmaking has legally taken place.

Online sexual exploitation of children: This insidious crime occurs when a child predator uses the Internet to establish online relationships with children, usually with the intent of taking the relationship into the physical world. Chat rooms, message boards, and social networking sites have become easy places for offenders to make these sinister connections with children who are online. Online Fraud Online fraud is the use of deceit or a breach of confidence online in an effort to profit financially.

Among the more common types of online fraud are such crimes as auction fraud, lottery/inheritance scams, Nigerian letter schemes, pushing (posing as a legitimate business in an effort to convince victims to divulge valuable information such as bank account numbers and passwords), and others. Auction fraud: In auction fraud, the sale of products advertised on Internet auction Websites such as eBay are either been misrepresented by the seller (e. G. , the item received is not as described online), or are never delivered after the victim has paid.

Lottery scams : These crimes involve a victim being contacted via email by the offender and told that they have won an online lottery of up to hundreds of millions of dollars. The victim is instructed to pay a fee to initiate the process of receiving the prize and may be asked to do so several times. Nigerian schemes: Also called a 419 (so named for Section 419 of the Nigerian Criminal Code), Nigerian schemes are a new spin on the advance-fee swindle. This crime involves convincing the victim to send money to the perpetrator in order to share in a large sum of money from a foreign bank account.

Offenders often craft fantastical stories, filled with sorrow and motional appeal, in an effort to convince the victim to send money, reveal bank account numbers, and divulge other personal information. Pushing: In pushing fraud schemes, an offender poses as a legitimate business, such as a bank, credit card company, or online retailer, in an attempt to convince the victim to divulge sensitive information such as passwords or bank account information. The crime often involves spoofed emails that are designed to look as though originating from a credible source, and direct the victim to visit fraudulent Websites.

The purpose of such schemes is to ultimately steal the user’s personal information and use it to profit financially by selling it, withdrawing funds from the victim’s bank account, or taking out loans in the victim’s name. Online Theft Online theft involves using the Internet to steal information, property, or money from its rightful owner. Identity theft and piracy fall into this category of Internet crime. 4 Identity theft: This type of crime involves the misuse of an individual’s personal information without their consent or knowledge for the purposes of committing fraud or theft.

After the victim’s personal information (bank account and credit card numbers) is obtained, offenders often purchase goods or services while posing as the victim. Online piracy: Stealing or sharing intellectual property using the Internet is an example of online piracy. Common targets of piracy are popular media such as music and videos (movies and TV shows), or computer programs such as video games and Microsoft Office. The piracy problem is compounded by proper-peer (POP) file-sharing sites, through which these illegally copied materials can be distributed.

Online Intrusion Online intrusion involves the use of the Internet to invade, harm, or otherwise infect another individual’s online space, computer programs, or computer systems. The most common examples of this type of online crime are hacking and sending out viruses or worms. Hacking: Any act in which an individual or individuals attempt to surpass a Website, network, or computer system’s security measures is considered hacking. This act may be completed to steal personal information, or even simply to show off an individual’s advanced computer skills.

Viruses and Worms: These programs are designed specifically to spread throughout computer networks, most typically to disrupt operating activity and reduce system efficiency. The main difference between the two is that viruses attach themselves to other programs, such as email, and rely on users to unwittingly help spread them while communicating with others online. Worms, however, are free functioning. They do not need to be attached to other programs and can simply spread without any assistance from users on the network.

The Legal System’s Approach to Internet Crime Internet crime poses a special problem for both law enforcement and the Judicial system. The Internet and the number and type of Internet users have grown much quicker than anyone could have imagined. Likewise, Internet crime is progressing tit great momentum, as new methods of accessing targets are surfacing almost daily. As a result, local police departments are constantly playing catch-up in their efforts to prevent and control Internet crime. Beginning in the sass, many police departments had begun developing cybercafé units in an effort to combat Internet crime.

These units have been created at the federal, state, and local levels. They are specialized units comprised of both law enforcement officers and civilian personnel with a certain level of computer expertise. While their main concern is to educate the public about the dangers of Internet rime, cybercafé units also attempt to detect, investigate, and apprehend online offenders. In an effort to reach the general public, most cybercafé units have their own Website. A study performed by Sesame Hindu and Joseph Schafer in 2009 found that there were 88 different U.

S. Police department cybercafé-unit Websites in 2007. While several states had multiple Websites, about a third of states had no cybercafé unit Websites. Given the impact of Internet crime already wreaked on law enforcement and the general public, it is very possible that every major city police department will have a cybercafé unit in the future. The Judicial and legislative branches of the government are also striving to stay ahead of Internet criminals. State and federal statutes focused on Internet crime are relatively new to the legal system.

Laws are created in one of two ways. Legislators either propose new bills, some of which are eventually passed and made into law, or existing laws are amended to include new criminal behaviors. Both processes have been used in the establishment of laws against Internet crime. For example, hacking is a crime that is relatively unique to computer systems and the Internet. As a result, most hacking saws had no previous legal precedent, and their content had to be originally drafted. Other crimes, however, such as cabinetmaking and accessibility, have an offline counterpart.

In many states, previous stalking and harassment laws were simply amended to include use of electronic communication devices. All U. S. States and the District of Columbia have established laws 5 forbidding some type of Internet crime. There are also several federal statutes forbidding a wide range of online activities. By 2010, there were laws focusing on almost every known facet of Internet crime, including hacking, password cracking, irises, cyberspace, cabinetmaking, accessibility, subdirectories, theft of intellectual property, identity theft, inappropriate communication with minors, and online child pornography.

While not every U. S. State currently has laws forbidding every type of Internet crime, legislators pass new statutes every year to address the growing number and different types of online criminal behavior. Pro: The Ability to Prosecute Internet Crime While they do share some similarities, Internet and traditional criminal behaviors are very different. This is most evident in the attempts by law enforcement to prevent ND control crime. Valid and reliable evidence plays a significant role in securing a conviction, and criminal cases of all types are either made or broken based on one key element-?physical evidence.

Conversely, in many situations, evidence is fundamental to proving the innocence of the accused. With many traditional street crimes, however, evidence can easily be contaminated or destroyed. Blood or DNA can be destroyed with bleach, fingerprints can be wiped away, and weapons can be altered or destroyed. Research has shown that eyewitness testimony is not very reliable and can be altered by time, stress, and/or fear. However, it is not so easy to corrupt evidence in the cyber world. The expression “once something is put on the Internet, it can never be removed,” is a commonly repeated phrase.

To a certain extent, this is true. While truly expert computer users may be able to remove some items that have been posted or sent on the Internet, the average person is simply unable to delete information from the Internet. With so many computers on the network, information is stored in so many different places that it is practically impossible to completely erase or destroy it. Although one can remove a picture or died from his/her social networking site, it is still stored on the site’s servers. The IT staff at any office can retrieve deleted emails, find hidden files, and in many cases recover corrupted documents.

While this may be disheartening for many people, it is invaluable for law enforcement to perform an investigation and gather evidence. With the exception of the few true computer geniuses, individuals who commit Internet crime will leave a digital trail. As a result, with enough expertise and persistence, the police are often able to build strong evidence-based cases against Internet criminals. Con: Lack of Awareness and Internet Crime Challenges For most of the general public, there appears to be a strong disparity between the perceived severity of street crime versus Internet crime.

Simply put, individuals are not as afraid of becoming victims of Internet crime as they are being victims of street crime. This occurs because most people do not have a clear understanding of the dangers of Internet crime. In many instances, a victim of Internet crime rarely comes into direct, face-toffee contact with the offender, and often does not even realize they have been victimized until after the crime occurs. When individuals are not afraid of being victimized, they let their guard down, making them vulnerable targets to offenders.

This is especially problematic for groups or demographics that do not routinely adopt crime prevention and security measures and are already vulnerable to factorization, such as children. While U. S. And international police departments are beginning to utilize cybercafé units in an effort to prevent and control Internet crime, it has not come without difficulties. Internet crime is a completely new arena for law enforcement, and most departments need to make numerous organizational hangs to effectively combat it.