Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Cyber Crimes and the FBI
The investigative techniques used by the FBI in the case of Vasiliy Gorshkov and Alexey Ivanov were completely legitimate and necessary; moreover, they demonstrated that law enforcement of the United States was prepared to use any means necessary to apprehend these flagrant security risks. "Court papers described the men as kingpins of Russian computer crime who hacked into the networks of at least 40 U.S. companies and then attempted to extort money" (Brunker, 2000). These men were formidable criminals who used the Internet and computers as their weapons of choice to destroy, manipulate and victimize American companies. There's a very strong and very legitimate argument which asserts that the only way to go after such elusive criminals is via the same type of trickery and subterfuge that they engage in themselves. It's very hard to fight fair with criminals who are engaging in the most absolute underhanded practices, particularly ones which involve the Internet, as it's exponentially easier to conceal one's actions and intentions and to be cloaked and buried within the vastness of the expansive Internet.
Part of the uproar which emerged after the actions of the FBI were uncovered asserted that they had behaved in a manner that was potentially unlawful. "According to court documents filed in the case, the FBI and Department of Justice lured two suspected Russian hackers to Seattle with job offers at a fictitious security company. After monitoring the duo's connection to two servers in Russia, the FBI used the suspects' passwords to download incriminating data from those servers" (Lemos, 2001). This was precisely the tactic that was going to be scrutinized in court; though multiple parties were concerned that it might be considered lawful and the repercussions of such an event. For example, "…if it is deemed lawful, the precedent could allow law enforcement and intelligence communities free rein to hack foreign computers. In addition, such a ruling could provide a legal loophole for other countries to break into U.S.-based computers in search of data that could aid their own investigations" (Lemos, 2001). This is a truly formidable consequence and one which many were aware could create truly dire results -- not just for American security, but for all of international security.
Other critics of the FBI accuse them of entrapment: while these hackers were indeed waging a certain degree of terror and victimization upon American companies and engaging in conspiracy, fraud and extortion, they were still disadvantaged young adults looking for a better life. Ivanov hacked from an abandoned factory in Chelyabinsk, Russia. Many critics felt quite justified in accusing the FBI of entrapment as they lured these hackers out of their hiding places with the promise of a better life: a chance to get out of Russia and snag a lucrative job in America. "But Chelyabinsk, a Stalinist burg located in the Ural Mountains, is a pretty bleak place to grow up. The town has twice endured nuclear catastrophe -- an arms plant dumped waste in a local lake for years, and in 1957 a nearby nuclear weapons factory showered the vicinity with 70 tons of radioactive dust -- making Chelyabinsk one of the world's most polluted cities" (Koerner, 2002). As Koerner explains, it's very difficult there to get a job. While this doesn't justify crime or illegal activity, it helps to paint a clearer picture as to how such bright mind like Ivanov and Gorshkov came to be hackers and why they didn't think twice when they were offered a job by an American company straight out of the blue.
Many naysayers felt that Ivanov and Gorshkov were lured to the United States and then led to entrapment, a tactic which should be considered illegal. However, such a viewpoint is just sanctimonious and a truly narrow interpretation of the law. In the age of cyber crimes, luring criminals out from their hiding places is essential. It's almost one of the only ways to catch them. Even though some say the FBI was engaging in a method of attack that bordered on illegality, others need to rightly praise it for being clever, being nuanced and more than anything, being effective. Furthermore, the FBI agents were upfront with Ivanov and Gorshkov about what the job would entail -- they needed hackers. One could argue…[continue]
"Cyber Crimes And The FBI The Investigative" (2013, May 01) Retrieved October 21, 2016, from http://www.paperdue.com/essay/cyber-crimes-and-the-fbi-investigative-87877
"Cyber Crimes And The FBI The Investigative" 01 May 2013. Web.21 October. 2016. <http://www.paperdue.com/essay/cyber-crimes-and-the-fbi-investigative-87877>
"Cyber Crimes And The FBI The Investigative", 01 May 2013, Accessed.21 October. 2016, http://www.paperdue.com/essay/cyber-crimes-and-the-fbi-investigative-87877
Cyber crime is an ongoing and growing problem for businesses, for government, and for private individuals throughout the world. This paper identifies the kinds of cyber crime that are threatening computer users, notably businesses. It also proposes strategies that businesses can embrace that will (in many cases) prevent the intrusion of cyber criminals into servers and hard drives. What particular cyber crimes do businesses / individuals need to be wary of? An
Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such
The fact that industrial control systems may be vulnerable to infiltration by other citizens, or international parties puts laws pertaining to intersection of systems transmission at the forefront of priorities for us all. At present, telecommunications interference of private citizens holds an up to a five-year prison sentence by U.S. federal law. How cyberterrorism is addressed, when the stakes are heightened, leaves a whole host of opportunities for citizens, and
Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year
Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the
Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas
Vasiliy Gorshkov and Alexey Ivanov v. The FBI There is much controversy with regard to the FBI's involvement in capturing Russian cyber criminals Vasiliy Gorshkov and Alexey Ivanov, taking into account the unorthodox method the bureau used. Many are likely to consider that such actions are against principles associated with law enforcement and that the authorities were wrong in taking on such attitudes. However, when considering the contemporary society being a