Free Sample: The Role of the Internet and Crime paper example for writing essay

The Role of the Internet and Crime - Essay Example

The criminal sees not have to be present to commit crime; this means there Is a broader area to find victims. They can interact virtually, scope the globe for potential new victims or crimes, and can stay anonymous. “A Kent man was arrested early Thursday on charges of possession and distribution of child pornography after a tip led police to his computer, police said. Detectives said they located evidence that 63-year-old Dean S. Porter had traded sexually explicit Images and videos Involving underage children.

The Images depicted girls ranging in age from about 6 to 17 years old and were traded using the internet, lice said (Media Group. 2013). ” This example shows how this man used his computer to aid In the crime of child pornography. Harassment can be found anywhere including sitting alone in a room with no one around but a computer. Laws have sprung up since many of these different examples of online harassment. “In October a 19-year-old man was sentenced to 12 weeks in jail in the UK for posting what a judge called “despicable” comments on his Backbone page about a missing 5-year-old girl.

And in a highly publicized cyber bullying case, a Missouri woman was convicted in 2008 after prosecutors say she created a fake Namespace profile to befriend and then abandon a 13-year-old neighbor girl, leading the girl to hang herself (Grids, B. 2012). ” Laws are being made to help prosecute and toys In 2009 over 100 Americans and Egyptians were arrested after a large international identity theft ring was discovered. The ring targeted two large banks which victimized over 5,000 U. S. Customers.

The compromising of the two banks was caused from “pushing” which is gaining personal information by sending phony emails from legitimate looking businesses. (Ferried, T. 2009) Organized crime has been around since the early sass’s. It is defined as unlawful activity from a group for profits. It is usually a secretive group which infiltrates members from society law abiding communities such as law enforcement, Judiciary members, and legislative. Extortion and bribery were used to control these members. Organized crime has taken on an increasingly transnational nature and with more open borders and the expansion of the Internet, criminals endangers the United States not only from within the borders, but beyond (Finale, K. 2010). ” Today’s organized crime interacts internationally with other criminal groups easily through he internet. They use computers to store information and transfer money while laundering it, run Internet-based sports betting, and can use technology to increase their borders for extortion and racketeering.

Criminal activities are now usually conducted within virtual criminal networks centered on online meetings. These networks are structured on “stand alone” basis, as members rarely meet each other in person and sometimes do not even have a virtual contact with other colleagues. This structure, together with access to the core operations granted only to trusted associates, prevents organized cybercafé groups from being detected and infiltrated by law enforcement. The computer systems’ vulnerabilities and software are exploited to create crime ware such as viruses, Trojan, key loggers.

Free Sample: The Role of the Internet and Crime paper example for writing essay

The Role of the Internet and Crime - Essay Example

Constitution. With Just a few keystrokes, an individual can have access to all forms of pornography, bomb-making instructions, poison recipes and a plethora of extremist Ideologies expressing everything from radical religious cults to terrorist crime groups” (justice) Criminal activity has been aided by the internet by three specific activities. One example is Internet fraud which is also called internet scams. Sometimes, people will try selling you something on the Internet at prices that seem unbeatable and sometimes magical.

These websites would ask you for your credit card and personal information. Then they will steal your money and they have committed fraud. Second example is identity theft. As most people already know identity theft is the fastest growing crime of any today. The number of new cases of Identity theft Is staggering. Some of these cases Involve the theft of huge volumes of personal Information by credit card companies. For example, “Master card had a recent case where more than 400,000 customers had their personal information stolen” (FBI).

With the creation of several identity theft programs they are catching the criminals before real damage can be done. Life lock Is one such program that alerts you to any changes or usage of your personal information. The third example is internet sex crimes. Using the internet to lure or entice a minor, to commit child pornography or to commit any other sexual offense can result in severe penalties. “Internet sex crimes against minors In particular are harshly prosecuted and a conviction will likely result In a state or federal prison sentence, sex offender registration, fines, and probation” (justice).

When we think of technology and crime we think of cybercafé, hacking, blackmailing, fraud, theft and extortion. No one can deny that technology has elevated crime rates and has given birth to a variety of new crimes, but has it not done enough to solve them. Cell phones, email, and instant messaging have 1 OFF from different countries no longer have to sit in the same conference room and plot, with the fear of any law enforcement agency locating their secret meeting place.

All a criminal has to do is either talk to each other on their cell phones using conference calling and send and receive written and graphical information on the same device, or simply send an email. Crimes like drug dealing do not depend on letters, but on he use of a phone to set up meeting to sell product and receive money. Hacking is the most famous computer crime of this time. It can be done anywhere, any time. Every innocent computer can be used to hack, either into a bank, a company, and the government.

Millions can be stolen from a bank in minutes. Valuable and personal information can be accessible in seconds once their computer is hacked. New internet users or naive internet users are the main target of pushing. A criminal will create a web page that seems to be a respectable online shopping website so they can get you to buy something so they can steal your personal information. Computer viruses do not put the user’s personal information in Jeopardy, but causes a nuisance. A virus can spread like a disease.

It can spread throughout the hard disk and is transferable through any storage device connected to the infected computer or any email sent from the infected computer. An antivirus program should be run on a computer daily before opening up any program. It is not wise to disable any security programs on your computer it can open the door to a virus and be very costly to repair. We now see that though technology has evolved crime, it has also given way to ewe techniques to solve and prevent it.

This is partly because law enforcement agencies across the world have developed far more expertise than ever before in tracking down the perpetrators of internet crimes. It’s also partly because anti-virus researchers have now had many years practice in dealing with large-scale epidemics. Fast response to new threats, in the form of virus definitions, is Just the visible tip of the iceberg here. “Anti-virus research teams worldwide have developed ‘early warning antennae’ giving them early visibility into malicious activity on the internet.