SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Elizabeth Hall
Kaplan University
CJ216-07
Erik Bernholdt
5.18.10
Cyber Vandalism/Computer
Crimes
Technology Crimes
Cyber Theft/Computer Related
Crimes
Cyber Warfare
(Siegel, 2010)
(Foster, 2000)
Computer Crime in which the
computer or the performance of the
computer is attacked
Carried out through the computer for
malevolent intent, vengeance, or damage
(Siegel, 2010)
(Foster, 2000)
Worms- usually spread through e-mails, attaches itself and
resends itself out through your e-mail contacts. Causes files to
react slowly, and works its way through individual and network
computers.
Viruses- usually spread through innocent looking links and
social network sites attaching itself to applications, videos, and
hyperlinks. Very harmful to computers, causes hard drive failure,
or can contain backdoor Trojan programs which can contain key-
loggers, remote access programs, open pornography sites on its
own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in
order to use services, change information, or steal information
(Siegel, 2010)
(Foster, 2000)
Cyber Bullying- Repeatedly posting threatening
messages, rumors, lies, and other hurtful things on
social networking sites against someone, or sending
threatening e-mails etc.
Cyber Stalking- unwanted pursuing of another
person through the internet either stealthily or
openly
This crime generally means malicious or harmful
actions directed at computers or persons via internet
(Siegel, 2010)
(Foster, 2000)
Technology used in crime commission other than
computers themselves- includes software
These crimes often affect the elderly through phone
scams promising large cash prizes after giving up
personal information such as bank account numbers, or
social security numbers.
(Siegel, 2010)
(Foster, 2000)
Cell Phone Fraud- fraudulently or
legitimately obtained cell phones used for
deceptive purposes such as promises of fake
charities or prizes designed to illicit personal
information and money from people
Software Piracy- illegal downloads of
software from the internet
(Siegel, 2010)
(Foster, 2000)
Shoplifting Software
Physically stealing hardware for
resale or information
Theft of cable services
(Siegel, 2010)
(Foster, 2000)
Duplicating Software
Selling duplicated software via internet or
otherwise
This crime generally means using technology
other than computers in commission of crime
(Siegel, 2010)
(Foster, 2000)
Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
These crimes promote child pornography, and
perpetrators swindle millions of dollars a year from
innocent people while remaining anonymous.
(Siegel, 2010)
(Foster, 2000)
Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs
for profit
Denial of Services Attack- used to annoy or
extract money from web users by preventing
access to service
(Siegel, 2010)
(Foster, 2000)
Illegal Copyright Infringement (Warez) –
stealing software, destroying it’s copyright
information, then posting on internet or file
sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or
bank account information
(Siegel, 2010)
(Foster, 2000)
Phishing- duplicating legitimate websites in
order to obtain personal information
E-tailing- illegal buying selling products via
internet using fraudulent receipts (shoplisting)
and switching codes on merchandise for refunds
(Siegel, 2010)
(Foster, 2000)
Cyber crime in which perpetrators have political
motives attached
These crimes may involve computer network
penetrations on military bases, defense contractors, and
aerospace companies. The goal is to embezzle vital data
and information
(Siegel, 2010)
(Foster, 2000)
Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use the
internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons lab.
Can also be used to attack electric power and
essential services
(Siegel, 2010)
(Foster, 2000)
The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes so
rapidly it is hard to keep up with the training
(Siegel, 2010)
(Foster, 2000)
Some of these challenges include:
Global nature of cybercrime
High tech crimes are often misclassified causing
Statistical information to be skewed
Allocation of funds usually favors traditional
crimes because of skewed statistics
Plenty of these crimes go unreported or recorded
wrongly as traditional crimes, for the UCR
(Siegel, 2010)
(Foster, 2000)
Foster, R.E. (2000). Police Technology. Upper Saddle
River: Pearson Prentice Hall
Siegel, L.J. (2010). Criminology: Theories, Patterns, and
Typologies. Tenth Edition. Belmont:
Wadsworth Cengage Learning.

Weitere Àhnliche Inhalte

Was ist angesagt?

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competitionMumbai University
 
Computer Crime
Computer CrimeComputer Crime
Computer CrimeAdeel Rasheed
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimeslittle robie
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPTGaurav Lakha
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cyber crime
Cyber crime Cyber crime
Cyber crime Jayant Raj
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 

Was ist angesagt? (20)

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 

Andere mochten auch

Cyberterrorism
CyberterrorismCyberterrorism
CyberterrorismMichael Wynn
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismTughral Yamin
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismDeepak Pareek
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismshaympariyar
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorismloverakk187
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Project synopsis
Project synopsisProject synopsis
Project synopsisgirija12345
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber TerrorismShivam Lohiya
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsisSheshank Priya
 

Andere mochten auch (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Project synopsis
Project synopsisProject synopsis
Project synopsis
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
SYNOPSIS WRITING
SYNOPSIS WRITINGSYNOPSIS WRITING
SYNOPSIS WRITING
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
 

Ähnlich wie High tech (cyber) crimes

High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptxmnm Lastopop
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorismDharani Adusumalli
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMostafa Elgamala
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeMukul Kumar
 
Internet
InternetInternet
InternetJodip
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cybercrime
CybercrimeCybercrime
Cybercrime9410953429
 

Ähnlich wie High tech (cyber) crimes (20)

High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet
InternetInternet
Internet
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Mehr von Elizabeth Hall

Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...Elizabeth Hall
 
Unit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyUnit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyElizabeth Hall
 
Unit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionUnit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionElizabeth Hall
 
Unit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesUnit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesElizabeth Hall
 
Unit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseUnit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseElizabeth Hall
 
Unit 7 project 9 11 attacks
Unit 7  project 9 11 attacksUnit 7  project 9 11 attacks
Unit 7 project 9 11 attacksElizabeth Hall
 
Unit 8 project identifying crime patterns e hall
Unit 8 project identifying  crime patterns e hallUnit 8 project identifying  crime patterns e hall
Unit 8 project identifying crime patterns e hallElizabeth Hall
 
Unit 9 project elizbeth hall
Unit 9 project elizbeth hallUnit 9 project elizbeth hall
Unit 9 project elizbeth hallElizabeth Hall
 
Unit 5 project elizbeth hall
Unit 5 project elizbeth hallUnit 5 project elizbeth hall
Unit 5 project elizbeth hallElizabeth Hall
 
Unit2 project elizbeth hall
Unit2 project elizbeth hallUnit2 project elizbeth hall
Unit2 project elizbeth hallElizabeth Hall
 
Unit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallUnit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallElizabeth Hall
 
Unit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallUnit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallElizabeth Hall
 
Unit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallUnit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallElizabeth Hall
 
Unit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallUnit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallElizabeth Hall
 
Unit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallUnit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallElizabeth Hall
 
Hall elizabeth unit nine project
Hall elizabeth unit nine projectHall elizabeth unit nine project
Hall elizabeth unit nine projectElizabeth Hall
 
Police Information Acces
Police Information AccesPolice Information Acces
Police Information AccesElizabeth Hall
 
Hall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperHall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperElizabeth Hall
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismElizabeth Hall
 

Mehr von Elizabeth Hall (20)

Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...
Hall del elizabeth del proyecto de la unidad 9 que determina la traducciĂłn es...
 
Unit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competencyUnit 9 project elizabeth hall assessing competency
Unit 9 project elizabeth hall assessing competency
 
Unit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selectionUnit 8 project elizabeth hall psychology jury selection
Unit 8 project elizabeth hall psychology jury selection
 
Unit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological rolesUnit 5 project elizabeth hall psychological roles
Unit 5 project elizabeth hall psychological roles
 
Unit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defenseUnit 7 project elizabeth hall civil committment and insanity defense
Unit 7 project elizabeth hall civil committment and insanity defense
 
Unit 7 project 9 11 attacks
Unit 7  project 9 11 attacksUnit 7  project 9 11 attacks
Unit 7 project 9 11 attacks
 
Unit 8 project identifying crime patterns e hall
Unit 8 project identifying  crime patterns e hallUnit 8 project identifying  crime patterns e hall
Unit 8 project identifying crime patterns e hall
 
Unit 9 project elizbeth hall
Unit 9 project elizbeth hallUnit 9 project elizbeth hall
Unit 9 project elizbeth hall
 
Unit 5 project elizbeth hall
Unit 5 project elizbeth hallUnit 5 project elizbeth hall
Unit 5 project elizbeth hall
 
Unit2 project elizbeth hall
Unit2 project elizbeth hallUnit2 project elizbeth hall
Unit2 project elizbeth hall
 
Unit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hallUnit 7 assignment elizabeth hall
Unit 7 assignment elizabeth hall
 
Unit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hallUnit 6 assignment elizabeth hall
Unit 6 assignment elizabeth hall
 
Unit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hallUnit 5 assignment elizabeth hall
Unit 5 assignment elizabeth hall
 
Unit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hallUnit 2 assignment elizabeth hall
Unit 2 assignment elizabeth hall
 
Unit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hallUnit 9 assignment elizabeth hall
Unit 9 assignment elizabeth hall
 
Hall elizabeth unit nine project
Hall elizabeth unit nine projectHall elizabeth unit nine project
Hall elizabeth unit nine project
 
Police Information Acces
Police Information AccesPolice Information Acces
Police Information Acces
 
Hall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup PaperHall Elizabeth Seminar 7 Makeup Paper
Hall Elizabeth Seminar 7 Makeup Paper
 
Unit 5 Project
Unit 5 ProjectUnit 5 Project
Unit 5 Project
 
The Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And TerrorismThe Evolution Of Politicical Violence And Terrorism
The Evolution Of Politicical Violence And Terrorism
 

High tech (cyber) crimes

  • 2. Cyber Vandalism/Computer Crimes Technology Crimes Cyber Theft/Computer Related Crimes Cyber Warfare (Siegel, 2010) (Foster, 2000)
  • 3. Computer Crime in which the computer or the performance of the computer is attacked Carried out through the computer for malevolent intent, vengeance, or damage (Siegel, 2010) (Foster, 2000)
  • 4. Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key- loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information (Siegel, 2010) (Foster, 2000)
  • 5. Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc. Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly This crime generally means malicious or harmful actions directed at computers or persons via internet (Siegel, 2010) (Foster, 2000)
  • 6. Technology used in crime commission other than computers themselves- includes software These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers. (Siegel, 2010) (Foster, 2000)
  • 7. Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet (Siegel, 2010) (Foster, 2000)
  • 8. Shoplifting Software Physically stealing hardware for resale or information Theft of cable services (Siegel, 2010) (Foster, 2000)
  • 9. Duplicating Software Selling duplicated software via internet or otherwise This crime generally means using technology other than computers in commission of crime (Siegel, 2010) (Foster, 2000)
  • 10. Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous. (Siegel, 2010) (Foster, 2000)
  • 11. Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Denial of Services Attack- used to annoy or extract money from web users by preventing access to service (Siegel, 2010) (Foster, 2000)
  • 12. Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information (Siegel, 2010) (Foster, 2000)
  • 13. Phishing- duplicating legitimate websites in order to obtain personal information E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds (Siegel, 2010) (Foster, 2000)
  • 14. Cyber crime in which perpetrators have political motives attached These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information (Siegel, 2010) (Foster, 2000)
  • 15. Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services (Siegel, 2010) (Foster, 2000)
  • 16. The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training (Siegel, 2010) (Foster, 2000)
  • 17. Some of these challenges include: Global nature of cybercrime High tech crimes are often misclassified causing Statistical information to be skewed Allocation of funds usually favors traditional crimes because of skewed statistics Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR (Siegel, 2010) (Foster, 2000)
  • 18. Foster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice Hall Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. Belmont: Wadsworth Cengage Learning.