Verified Document

Criminal Investigations: Changes In Cybercrime The Rate Essay

Criminal Investigations: Changes in Cybercrime The rate at which internet usage is growing is expeditious. The World Wide Web is fast eliminating the physical borders that originally existed between nations and individuals, and rapidly transforming the world into a global village. The conduct of business has been made easier, and so has education, sports, communication, to mention but a few. Thanks to the internet, people located miles away from each other, who would have otherwise been oblivious of each other's existence, or been able to communicate, can now relate at the touch of a button. This high degree of interaction is, however, also the cause of one of the most damaging cyber related concerns -- cybercrime.

Definition

Cybercrime, according to the Oxford Dictionary, is a crime "carried out by means of computers or the internet." Thus, any crime that makes use of a computer, either as a target, instrument, or as a medium for further crime perpetuation, falls within the confines of cybercrime (the Legal Dictionary, 2014). Therefore, unlike conventional crimes such as stealing, mugging, or robbing, cybercrime does not require the criminal's physical presence, which explains why its control and regulation is proving difficult (the Legal Dictionary, 2014).

Cybercrime against Persons

There are 3 key cybercrime categories. These include; cybercrime against persons, against property, and against government (Nandini, n.d.). Cybercrime against persons is the most common of the three, and law enforcement agencies all over the world are working hand-in-hand towards reducing its prevalence (the Legal Dictionary, 2014). The most common forms of cybercrimes against persons are; cyber-stalking, harassment via electronic mail, and "trafficking, distribution, posting and dissemination of obscene material, including pornography and indecent exposure" (Nandini, n.d.). In the...

The famous Ahmadabad case where a minor was almost Gang raped after being lured through a chat room conversation is a perfect example (Nandini, n.d).
How IT Prevalence has Changed Cybercrimes against Persons

Cybercrime against persons involves "infiltrating the trust of other users of a computer network for profit or gain" (Criminal Lawyer Group, 2014). In order to bring out the change brought about by IT prevalence, two periods (pre-2000 period and post-2000 period) which had different IT prevalence levels will be compared.

Pre-2000: In the pre-2000 period, cybercrimes were mostly one-man operations - centered at taking advantage of the glaring weaknesses in computer networks (Criminal Lawyer Group, 2014). Such crimes were, in most cases, carried out by computer nerds who were out to prove their toughness by revealing the weaknesses in computer systems (hacking). Rarely was cybercrime committed for profit or gain (Criminal Lawyer Group, 2014). Cybercrime against property was, therefore, more prevalent than that against persons, and was thus not considered a serious crime as such, especially because it usually did not result in tangible intentional damage (Criminal Lawyer Group, 2014).

Post-2000: The new millennium was accompanied by significant technological advancement. Internet usage became more prevalent, and computers became the most significant communication tools. Cybercrime too evolved; it was now no longer driven by ambition, but by the need to gain profit by exploiting other network users (Criminal Lawyer Group, 2014). Hackers realized that the internet provided a safe domain, through which one could gain profit and run a low risk of detection (Criminal Lawyer Group, 2014). The whole idea of hacking then changed;…

Sources used in this document:
References

Criminal Lawyer Group. (2014). Criminal Defense: The Evolution of Cybercrime from Past to the Present. Criminal Lawyer Group. Retrieved from http://www.criminallawyergroup.com/criminal-defense/the-evolution-of-cybercrime-from-past-to-the-present.php

Nandini, R.P. (n.d.). Cybercrime. Think Quest. Retrieved from http://library.thinkquest.org/06aug/02257/more.html

Texas AG. (2012). Criminal Investigations. Attorney General of Texas. Retrieved from https://www.texasattorneygeneral.gov/criminal/investigation.shtml

The Legal Dictionary. (2014). Internet Fraud. The Free Legal Dictionary. Retrieved from http://legal-dictionary.thefreedictionary.com/Internet+Fraud
Cite this Document:
Copy Bibliography Citation

Related Documents

Globalization and Organized Crime Globalization
Words: 3395 Length: 12 Document Type: Research Paper

Thus, many shipments go to another destination before the United States or Europe in order to throw law enforcement off of the trail. For cocaine coming out of Colombia, West Africa and Venezuela, home to rogue states and dictatorships, have become popular transit hubs. The increased transportation of goods accompanying globalization has increased opportunities for maritime piracy. Organized crime is exploiting the increasingly dense international flow of commercial vessels. Maritime

Crime Prevention in City X
Words: 1554 Length: 5 Document Type: Essay

Daytime Robberies in City X City X is facing nightmares of daytime robberies that have crippled social, economic, and political stability in the city. The police officers have failed to obtain adequate information related to the causes and the perpetrators of the robberies. Therefore, coming up with a plan to investigate the cases and end the situation is important to reduce the vice. The following essay discusses some of the

Prison Industrial Complex Research Theory
Words: 3250 Length: 11 Document Type: Research Paper

Research Theory: Prison Industrial ComplexPrison Industrial Complex (PIC) is the term frequently used for the mass imprisonment the United States has been using over the past few decades for the control of crime and the fulfillment of personal interests of industries offering surveillance, economic and political solutions in the same matter. The recent mass incarceration of the US has dragged its people to prisons leading to an uprise in crimes

Cyber Terrorism
Words: 4455 Length: 13 Document Type: Research Paper

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now