Verified Document

Policies For Addressing Global Cybercrime Essay

Globalization of Crime

The FBI (2011) case Botnet Operation Disabled shows what can happen when international criminal threat actors spread malware via servers to steal funds, hijack identities, and commit other crimes by way of a nefarious computer virus. There are numerous examples of this kind of cyber crime all over the world. For instance, hacktavist groups have proliferated in the 21st century and they use malware to infect government agency sites and industrial sectors (Kovacs, 2022). Additionally, the Asian-based cyber threat actor known as Webworm has been using modified malware to attack industries and agencies all over Asia (Lakshmanan, 2022a). And Charming Kitten (a prolific advanced persistent threat) originating from Iran has attacked using malware Gmail, Yahoo! and Outlook accounts all over the world (Lakshmanan, 2022b). Clearly the globalization of cyber crime is a problem, as all of these cases combined point out. This paper will analyze administrative practices in the international cybercrime cases and make recommendations for improvement.

Botnet Operation Disabled

The FBI (2011) case Botnet Operation Disabled reports how the FBI targeted a foreign botnet that was infecting 100,000 computers in the United States. The botnet, known as Coreflood, was used to steal personal and financial information by recording unsuspecting users' every keystroke. The FBI worked with Internet service providers and security companies to take control of the servers that were hosting the botnet, and then used those servers to send a kill command to the infected computers. As a result of this operation, the Coreflood botnet was taken down and the infected computers were freed from its control. This case is significant because it illustrates the governments ability to disrupt and dismantle large-scale criminal operations that are conducted online.

Other Similar Cases

As Kovacs (2022) shows, a pro-Palestine hacktivist group named GhostSec; and a group named Gonjeshke Darande and others hacked state infrastructure using programmable logic controllers, causing disruptions in various states. The hackers used open ports and other publicly available...

Lakshmanan (2022a, 2022b) also shows that Webworm has been using customized malware to attack government networks in Russia, Mongolia and other Asian countries to take control of these networks and steal funds/information; and that likewise Charming Kitten used malware to hack email accounts, scrape sensitive data and eavesdrop on conversations. The cases all have the same things in common: a cyber threat using vulnerabilities in networks and the ignorance of end users to prey upon systems and steal data or funds or take networks hostage.

Issues for Teams Working These Cases

One of the main issues for teams working to stop or prevent international cyber threats/crimes is that of attribution. That is, being able to identify who is behind a given attack. This can be difficult for a number of reasons. First, those carrying out attacks often use proxies or botnets to conceal their identity. Second, even if the identity of the attacker is known, it may be difficult to prove that they were acting on behalf of a government or other organization (Kovacs,...

…the various ways to neutralize them.

Potential Positive Results of Outcomes

There are a number of potential positive results that could come from changes in administrative practices to address global cybercrime. One is that it could lead to greater cooperation between different nations in terms of sharing information and investigators working together to track down perpetrators. This would be a major step forward in the fight against cybercrime, as currently there are often jurisdictional issues that hamper investigations. Another potential positive result is that it could help to deter would-be criminals, as they would know that there are better chances of being caught and punished if they engage in cybercrime. This could lead to a reduction in the overall levels of cybercrime, which would have a significant positive impact on society. It could also lead to more resources being devoted to prevention and detection of cybercrime, as well as increasing the punishment for those convicted of such crimes. This would send a strong message that society takes cybercrime seriously and is willing to invest in combating it.

Reflection

As someone who is aspiring to a career in criminal justice, it is important to be aware of the global implications of crime. Cybercrime is just one example of how crimes committed in one part of the world can have an impact on people and businesses in other parts of the world. By understanding the global landscape of crime, I can be better prepared to tackle the challenges that lie ahead in my career. Plus, as cybercrime becomes more…

Cite this Document:
Copy Bibliography Citation

Related Documents

Cybercrime Modern Scam: A Summary of the
Words: 1182 Length: 4 Document Type: Article Review

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Cyber Crime Malicious Activities Like Identity Theft,
Words: 2334 Length: 7 Document Type: Term Paper

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Cybercrime Is a Concept That
Words: 3003 Length: 10 Document Type: Essay

Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special

Cybercrime What's in a Name
Words: 2690 Length: 9 Document Type: Term Paper

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now