Cybercrime Cyber Theft Is a Term Paper
- Length: 8 pages
- Sources: 5
- Subject: Criminal Justice
- Type: Term Paper
- Paper: #83328658
Excerpt from Term Paper :
Think of a bank or mortgage company who is hacked, and the amount of personal data that can be downloaded and used elsewhere ("Cyber Investigations"). In addition, many hackers come into governmental or business computers and crash those servers, place viruses, bots, Trojans, email bombs, etc. -- or mine the data or manipulate the data -- where for competitive advantage or simply "as a prank," this is all part of this genre of serious Cybercrime (Wall, 2007).
Because of this plethora of cybercrime, Federal, State, and Local agencies continue to try to curtail the efforts of these criminals. Private corporations continually change their software and security protocol, but it is taking a great deal more complex codes to keep Cybercriminals out (Moreau, 2006). Most States, in fact, have their own Cybercrime units, most especially (at the State and Local level) to act in a more tactical manner. Because of the nature of Cybercrime in generally, though, it is typically the FBI, CIA and other Federal agencies that focus on this, and interface with Interpol and other national agencies in other countries ("Articles on Cybercrime"). Cyber terrorists, for example, can hit banks, credit card companies, clearing houses, or major corporations and disrupt the economy of an entire nation with the touch of a button. In fact, much like the NSA example, the problem is so vastly complex that it is almost impossible for any foreign policy expert to comprehend. Thus, for many, the more basic and simple scenario -- the detonation of a Weapon of Mass Destruction in a public venue, remains the top priority. However, sad though it may be, the pragmatic terrorist threat is actually embedded within this complex and seemingly endless network of global sympathizers, high-level financiers, and state sponsored covert foreign policy (Wirtz, 2006).
What can be done about Cybercrime? As much as the government or other law enforcement agencies try, they cannot seem to keep up with the trend. If one thinks about it, all a Cybercriminal needs is an internet connection and a computer, anywhere in the world -- then it is up to their own intellect and motivation (Cain, 2003). The personal user can try to prevent crime as much as possible by changing passwords, but the individual likewise cannot change their social security or birth date at whim ("Cybercrime Articles"). They can be certain they never give out information without the company or agency having appropriate security software installed, but even then, data mining, viruses, and traps exist all the time -- even if not for gain, making life complicated and computer use irritating for some (Hallam, 2008).
The Internet has, unarguably, changed the way that the world communicates, purchases, researches, and interacts. Along with this change, though, comes issues that focus on security for both the private and corporate individual. Why is this security so necessary, one might ask -- how can others have access to internal electronic data and measures, and what is the clear issue regarding these issues? The simple answer is termed "cyber theft," and is the reason it is necessary to expand the security for information technology. Cyber theft is a major criminal issue surrounding the use of the Internet. Cyber theft is not just identity theft; it entails so much more. General targets of Cyber theft or Cybercrime are small networks, personal computers, and, at times, businesses.
Recently, results from the 2011 Global Information Security Workforce Study found that the nature of information security has become so critical in most organizations that the shift is moving to a greater alignment between the public and private sectors. Governments, for instance, are facing similar issues as private companies, and the need for prioritization of security knows no national or international boundaries. In fact, the study showed that the magnitude of the problem is so acute that there remains a critical need for more skilled professionals who can" successfully handle the evolving challenges associated with safeguarding the nation's data and [electronic] infrastructure" (U.S. Government and Industry, 2011). Indeed, while the detection and prosecution of Cybercrime remains difficult, since over 50% of the activity is generated offshore, the industries involved continue to change computer chips, memory and firewall changes, and new software designed to block unauthorized access (ICT, 2005). It is clear, however, based on all the evidence and commentary, that Cybercrime remains quite serious, on the rise, and a critical problem for the foreseeable future, one that may, however, cause society to choose between personal privacy and protection from outside internet crime (Brin, 1999, "Take Charge").
We might then wonder what the future of cybercrime might be. In 2007, a group of the top leaders in cyber security met and identified their view of the most likely future scenarios: 1) Laptop encryption will become mandatory in many government and other key organizations; 2) Targeted cyber-attacks, particularly against government agencies, will increase dramatically, as will their economic impact; 3) Cell and Smart phone worms will affect at least 100,000 phones annually, jumping from phone to phone. 4) Attack techniques will become more sophisticated and severe -- spyware will continue to become a huge issue, and the majority of bots will be bundled together with rootkits that will change the operating system to hide the virus. The war between the hackers and defenders will continue, with the only way of getting ahead is to make the attacker's job harder and increasing penalties for those who are caught (Paller, 2011).
Balkin, J.M. et.al. (2007), Cybercrime: Digital Cops in A Networked Environment,
Brin, David, (1999), The Transparent Society: Will Technology Force Us To
Choose Between Privacy and Freedom? Basic Books.
Britz, Marjie, (2008), Computer Forensics and Cyber Crime, Prentice Hall.
Garfinkle, S. (2001), Database Nation: The Death of Privacy in the 21st
Century, O'Reilly Press.
Hallam, Phillip, (2008), The dotCrime Manifesto: How to Stop Internet Crime.
ICT Task Force (2005), Information Insecurity, United Nations.
"Internet Fraud." (2010, January). Federal Bureau of Investigation:
Knetzger, Michael, (2007), Investigating High-Tech Crime, Prentice Hall.
McQuade, Sam, (2005), Understanding and Managing Cybercrime, Wade.
McQuade, Sam. (2008), Encyclopedia of Cybercrime, Wade.
Mehan, J. (2008), CyberWar, CyberTerror, CyberCrime, IT Press.
Moore, Robert, (2005), Cybercrime: Investigating High-Technology
Computer Crime, Anderson.
Moreau, D. et.al. (2006), Cybercrime, Shinder, D.L. et.al. (2008), Scene of the Cybercrime, Syngress.
Wall, David S. (2007) Cybercrime: The Transformation of Crime in the Information Age,
Wiles, Jack and Anthony Reyes, (2007), The Best Damn Cybercrime and Forensics
Book Period, Syngress.
"Articles on Cybercrime," references in:
Cain. M. (2003), "Managing Technology," cited in:
Carvajal, Doreen, (4/6/08), "The Evolution of CyberCrime, Inc.," International
Hughlett, M. (2005). "Growth of cybertheft rattles security pros," Knight Rider Tribune
News Service, Washington.
Identity Theft Resource Center, Facts and Statistics.
Impact of all these Threats. (19 April, 2010).
Meyer, M.L. (1995). "Stop! Cyberthief! Crime and security violations on the Internet,"
"Computer Crime & Intellectual Property Section,"
"Cybercrime Articles," Database
"Cyber Investigations," FBI,
"Cybercrime," Norton From Symantec,
Govil, J. (2007, May 17). "Ramifications of Cyber Crime and Suggestive Preventive Measures" IEEE Xplore Digital Library: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?reload=true&tp=&arnumber=4374526&isnumber=4374432.
Martin, T. (2010, May 17). Credit Card Hijack Warning. The Mercury.com: http://www.themercury.com.au/article/2010/05/17/146595_tasmania-news.html
Paller, A. (2011). "Predicting the future of cybercrime and security. BSC- Chartered
Institute for IT.
President on Cybercrime: 'It has Happened To Me'" (May 29, 2009). USA Today -- The
Oval Office. Cited in:
Rantala, R. (2004). "Cybercrime against Businesses." U.S. Department of Justice.
"Security Articles on Cybercrime." (2010, October). Chartered Institute for IT: http://www.bcs.org/server.php?show=nav.11307
"Take Charge: Fighting Back against Identity Theft. Retrieved," FTC,
United States Government (2009). Internet Crime Report.
"U.S. Government and Industry Coming into Closer Alignment on Information
Security." (May 9, 2011). PRWEB.
Wirtz, J. (2006, January)."Indications and Warning in an Age of Uncertainty."
Center for Contemporary Conflict: http://www.nps.edu/Academics/SIGS/CCC/conferences/recent/Presentations/Wirtz%20I&W.pdf