Internet Crimes
Deviance: Internet Crimes
The Internet has revolutionized everything, from communication and entertainment to business. By one estimate, the Internet contains approximately 487 billion gigabytes (i.e., 487 Exabyte's) of data, and by the end of 2010, there were more than two billion Internet users. Nearly one-quarter of these users are members of social networking sites such as Facebook. There are many reasons for the Internet's extraordinary growth, including its vast applications, anonymity, and global outreach. (Lynn, 2010).
However, many of the factors that have contributed to the Internet's success have also made it a dangerous place. Criminals now take advantage of the Internet to exploiting suspecting users for personal, political, and financial gain. The current essay is an exploration of the concept of internet scams and fraud. The author will discuss in detail how the internet fraud began and the way it is affecting the internet users. There will also be discussion of the internet fraud protection method. The author will also focus on the relation of criminals to the deviance theory.
Prevalence of Internet Crimes
There has been a considerable evolution in cybercrime from the days of troubled teenagers, demonstrating their technical skills, to highly organized criminal enterprises earning millions of dollars. The financial toll imposed by cybercrime is also met by other threats, including espionage, terrorism, and cyber-warfare. According to a report by CBS news (CBS News, 2010), cyber attacks targeting the power grid caused major blackouts that affected millions of people in Brazil in 2005 and 2007. Incidents of cyber-warfare were suspected in 2007, when Estonian officials relocated a Soviet war monument (Anderson, 2007) and again in 2008 during the conflict between Russia and Georgia over South Ossetia (Danchev, 2008). At the time, armies of compromised computers all over the world were instructed to launch distributed denial of-services (DDoS) attacks against many government web sites in Georgia and Estonia, effectively knocking them offline.
In 2009, at least 34 corporations (including Google) were the targets of coordinated cyber attacks dubbed Operation Aurora that leveraged an unknown vulnerability in Internet Explorer to install malicious software (malware) that was capable of stealing sensitive information and intellectual property. The perpetrators of the breach are still unknown, but evidence suggests individuals in China may have been involved (Zetter, 2008). In June 2010, reports surfaced of an advanced piece of malware that targeted industrial control systems with an unprecedented level of sophistication, including multiple exploits that targeted unpatched or unknown vulnerabilities (i.e., 0-day exploits). This level of sophistication led some experts to suspect that the attack was state-sponsored and intended for Iran's nuclear power plants (McMillan, 2010). All of these events exemplify the increasing threat imposed by cybercrime and motivate the need for better protection, detection, and mitigation strategies.
Internet Scams
In 2009, the FBI's Internet Crime Complaint Center (IC3) reported a loss of $559.7 million dollars as a result of cybercrime. That was more than double the losses based on complaints filed just one year earlier in 2008, estimated at $264.6 million dollars. Figure 1.1 displays the losses reported to the IC3 over the past nine years. Note that from 2001 to 2009, there was more than a thirty-fold increase in losses due to Internet crime. The largest cybercriminal theft to date was an operation led by an American named Albert Gonzalez, whose crew is estimated to have cost businesses more than $400 million dollars (Verini, 2010) between 2006 and 2008. Gonzalez's crime syndicates gained access to approximately 130 million credit card numbers by hacking into Heartland Payment Systems, one of the largest credit card processors in the world, and victimized companies including T.J. Maxx, Target, Dave & Busters, Office Max, Barnes & Noble, JC Penney, 7-Eleven, and Boston Market. Gonzalez was captured in 2008 and sentenced to 20 years in federal prison for his crimes. The number and cost of data breaches has exploded in recent years. Scholars have described that deviance occurs when criminal persons breach...
Deviance Among Canadian Youths Deviation refers to the violation of the acceptable norms and values that have maintained within the cultural framework of a society. Norms are very important in every society since they allow the people of a given society to coexist with one another, and create the best environment for human living. The Canadian society like other societies is guided by certain norms and values, which are useful for
Deviance Biography Susan Smith was born into a traditional, middle class family. One of five daughters, Susan displayed a higher willingness to shoulder responsibility than her siblings at a very early age, which led to her parents' turning to her, for support, very frequently. The support sought was initially in the form of household chores, and then financial, once Susan was able to work, and especially after her marriage to a
Film And Book Analysis Donna and Entry Level Deviance In accordance to the cultural-transmission theory, deviance is a behavior that is learnt by means of interacting with others. Basically, individuals end up learning from other individuals who take part in deviant norms and also possess and display deviant values. Donna largely represent entry level deviance in the sense that she hangs out with cocaine and substance D addicts, but does not alter
Ethical Considerations in Computer Crimes The study is based on the topic of ethical consideration in computer crimes. The rapid expansion of computer technology has resulted in an extremely sensitive issue of computer crimes. The ethical standards that are applied in other fields cannot be applied to the field of computer technology therefore the paper has discussed various aspects that are crucial for the understanding of the topic. There are a number
Celibacy and Sexual Deviance by Priests Many psychologists have suggested that clergy who take a vow of celibacy are more likely to engage in sexual deviance than clergy who are allowed to marry. Many others argue that this is completely untrue. This research paper aims to examine these points-of-view to either prove or disprove the relationship between celibacy and sexual deviances by priests. In today's society, the Catholic Church is confronted with
Crime and Aileen Wuornos Criminal theories based on biological, psychological, sociological, and socio-psychological factors have been constructed in an attempt to better identify the causes of crime and what drives an individual to behave in a deviant manner. While data on male serial killers is prevalent, the data and statistics available in regards to female serial killers are extremely limited. One of the most well-known female serial killers, in recent
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now