Cybercrime What's in a Name Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four primary categories, which include:

unauthorized access to computer programs and files, unauthorized disruption, theft of identity, and carrying out of traditional offenses, such as distribution of child pornography, using a computer (Piazza 2006).

Ditzion, Geddes and Rhodes (2003) contend that due to the myriad of diverse computer related offenses, nothing less than the definition by the U.S. Department of Justice (DOJ) would suffice. The DOJ generally defines computer crime as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution." (Ditzion, Geddes & Rhodes, 2003)

The term "computer crime" not only includes traditional crimes committed using a computer, but also numerous technology-specific criminal behaviors technologies and the exponential expansion of the Internet have spawned. The Internet has also spawned numerous "cyberthreats," which can basically be defined as "using computer technology to engage in activity that undermines a society's ability to maintain internal or external order" (Brenner, 2007). As cyberspace spawns opportunities for individuals and groups to remotely commission attacks, they usually maintain their anonymity. More often than not, cybercriminals are not apprehended and remain unidentified (Brenner 2007)

No International Borders

Kumar (2002) notes cybercrime has spawned deep roots into cyberspace and that sophisticated cybercriminals and terrorists associated with drug trafficking, terrorist outfits regularly employ the Internet for anti-social, anti-national and criminal activities. He warns that "The criminals can move on a highway at the speed of light on which there are no traffic signals, no constables, without international border with no custom or immigration authorities to call the criminal to halt. Terrorist groups deftly utilize the Internet to pass on information to execute various terrorist acts, which, because they utilize computers, present serious negative impact on human life. "The cyber-terrorists have even acquired the capability to penetrate computer systems using 'logic bombs' (coded devices that can be remotely detonated), electro magnetic pulses and high-emission radio frequency guns, which blow a devastating electronic wind through a computer system. The hackers have gone to the extent of distributing free hacking software -- Rootkit, for instance -- to enable an intruder to get root access to a network and then control as though they were the system's administrators (Kumar 2002)."

The Cybercrime Scope Depending on the scope of the crime, Internet-related crimes, no matter what the name, like crimes committed offline, should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international levels. Primary federal law enforcement agencies that investigate domestic Internet crimes include: the Federal Bureau of Investigation (FBI), the United States Secret Service, the United States Immigration and Customs Enforcement (ICE), the United States Postal Inspection Service, and the Bureau of Alcohol, Tobacco and Firearms (ATF). The following Table (1) identifies a number of cybercrimes and the appropriate law enforcement agency for reporting the crime.

Table 1: Cybercrimes and Law Enforcement Agencies (Computer Crimes 2008)

Type of Crime

Appropriate Federal Investigative

Law Enforcement Agencies

Computer intrusion (i.e. hacking)

FBI local office

U.S. Secret Service

Internet Crime Complaint Center

Password trafficking

FBI local office

U.S. Secret Service

Internet Crime Complaint Center

Counterfeiting of currency

U.S. Secret Service

Child Pornography or Exploitation

FBI local office if imported,

U.S. Immigration and Customs Enforcement

Internet Crime Complaint Center

Child Exploitation and Internet Fraud matters that have a mail nexus

U.S. Postal Inspection Service

Internet Crime Complaint Center

Internet fraud and SPAM

FBI local office

U.S. Secret Service (Financial Crimes Division)

Federal Trade Commission online complaint) if securities fraud or investment-related SPAM e-mails,

Securities and Exchange Commission online complaint)

The Internet Crime Complaint Center

Internet harassment

FBI local office

Internet bomb threats

FBI local office

ATF local office

Trafficking in explosive or incendiary devices or firearms over the Internet

FBI local office

ATF local office

Kumar (2002) states computer-related crimes may be divided into two major categories:

The computer is the target of a crime:

a. Sabotage of computer systems or computer networks;

b. Sabotage of operating systems and programmes;

c. Theft of data/information (this is the fastest growing computer-related crime);

d. Theft of intellectual property, such as computer software;

e. Theft of marketing information; and f. Blackmail based on information gained from computerized files, such as medical information, personal history, sexual preferences, financial data, etc. (Kumar 2002).

The computer serves as the instrument of a crime.

a. Fraudulent use of Automated Teller Machine (ATM) cards and accounts;

b. Credit card frauds;

c. Frauds involving electronic funds transfers;

d. Telecommunication Frauds; and e. Frauds relating to Electronic Commerce and Electronic Data Interchange.

Theft of Intellectual Property Rights is also part of cyber space burglars. In USA alone, the Fortune 1000 companies suffer a loss of about 300 billion dollars annually on this account (Kumar 2002).

Even though an increased awareness exists regarding the significance of international cybersecurity, along with measures taken to improve capabilities, cyber risks continue to underlie national and global information networks, as well as critical systems they manage. To decrease risks requires unprecedented, active partnership among diverse components various countries around the globe (Computer Crimes 2008) - no matter what the name of the crime.


Bartlett, John, comp. Familiar Quotations, 10th ed, rev. And enl. By Nathan Haskell Dole. Boston: Little, Brown, 1919;, 2000.

A from:[08 March 2008].

Brenner, Susan W. "At Light Speed" Attribution and Response to Cybercrime/terrorism/warfare." Journal of Criminal Law and Criminology 97.2 (2007): 379+. Questia. Available from:[08 March 2008].

Computer Crime & Intellectual Property Section United States Department of Justice 2008. Available from:[08 March 2008].

A cybercrime. 2008 in Encyclopedia Britannica. Retrieved March 8, 2008, from Encyclopedia Britannica Online. Available from:[08 March 2008].

Cybercrime: Uncovered February 13, 2008 Computer Crime Research Center. Available from:[08 March 2008].

Cyberspace N.d. Available from: [08 March 2008].

A" Dennis, Michael Aaron 2008 Cybercrime. (2008). Available from: Encyclopedia Britannica online.[08 March 2008].

Ditzion, Robert, Elizabeth Geddes, and Mary Rhodes. "Computer Crimes." American Criminal Law Review 40.2 2003: 285+. Questia. Available from:[08 March 2008].

Jones, Benjamin R. "Comment: Virtual Neighborhood Watch Open Source Software and Community Policing against Cybercrime." Journal of Criminal Law and Criminology 97.2 2007: 601+. Questia. Available from:[08 March 2008].

Kumar, Atul 2002 Cyber Crime - Crime without Punishment. Available from:

Pangaro, Paul 2007 CYBERNETICS -- " a Definition. Available from:[08March 2008].

Piazza, Peter. "When Cybercriminals Turn Pro." Security Management May 2006: 48+. Questia. Available from:[08 March 2008].

Whittaker, Jason. The Cyberspace Handbook. London: Routledge, 2004. Questia. Available from:[08 March 2008].[continue]

Some Sources Used in Document:



  • Cyber Crime Task Force Plan

    Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

  • Cyber Crime and Technology Crime

    Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

  • Cyber Crime Malicious Activities Like Identity Theft

    Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

  • Security Threat Is a Potential Happening That

    security threat is a potential happening that may have an undesirable effect on the system, its resources, or the organization as a whole. Vulnerability is the weakness that makes it possible for the threat to occur. There are a number of threats that can occur on a system, and are usually grouped together since some overlap. Errors and Omissions -- Data entry, data verification, programming bugs. Fraud and Theft -- Skimming

  • U S Patriot Act How the

    Through experience, the FBI has acquired insights into the fact that there are no dividing lines distinguishing foreign intelligence, terrorist and criminal activities. Foreign intelligence, terrorism, and criminal organizations and activities are interdependent and interrelated (Abele, 2005). Files belonging to the FBI are full of investigation cases where the sharing of information between criminal intelligence, counterintelligence, and counterterrorism investigations is essential to the ability of the FBI. This is

  • It Risk Management Cyber

    The organizations are usually run by a core group, which divides the different responsibilities of an operation (e.g. spamming, web design, data collection) among the members. The members run their own outer networks to fulfill those responsibilities -- rarely even having contact with each other online. The decentralized structure of the internet, as well as the high levels of anonymity it provides makes it difficult for law enforcement agencies

  • Canadian Policies to Thwart Terrorist and Criminal

    Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism Problems being faced due to Cyber-Crime in Today's World What is Identity Theft? How and Why Cyber-Crime Occurs? Why Cyber-Crime has become an Important Issue? How Release of Personal Information makes an Individual vulnerable to Identity Theft? Future Implications Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty

Cite This Paper:

"Cybercrime What's In A Name " (2008, March 09) Retrieved October 20, 2016, from

"Cybercrime What's In A Name " 09 March 2008. Web.20 October. 2016. <>

"Cybercrime What's In A Name ", 09 March 2008, Accessed.20 October. 2016,

Leave a Comment

Register now or post as guest, members login to their existing accounts to post comment.

Read Full Term Paper
Copyright 2016 . All Rights Reserved