3. Computer Crime in which the
computer or the performance of the
computer is attacked
Carried out through the computer for
malevolent intent, vengeance, or damage
(Siegel, 2010)
(Foster, 2000)
4. Worms- usually spread through e-mails, attaches itself and
resends itself out through your e-mail contacts. Causes files to
react slowly, and works its way through individual and network
computers.
Viruses- usually spread through innocent looking links and
social network sites attaching itself to applications, videos, and
hyperlinks. Very harmful to computers, causes hard drive failure,
or can contain backdoor Trojan programs which can contain key-
loggers, remote access programs, open pornography sites on its
own, and access to total control over computer.
Computer Hacking â perpetrators break into security systems in
order to use services, change information, or steal information
(Siegel, 2010)
(Foster, 2000)
5. Cyber Bullying- Repeatedly posting threatening
messages, rumors, lies, and other hurtful things on
social networking sites against someone, or sending
threatening e-mails etc.
Cyber Stalking- unwanted pursuing of another
person through the internet either stealthily or
openly
This crime generally means malicious or harmful
actions directed at computers or persons via internet
(Siegel, 2010)
(Foster, 2000)
6. Technology used in crime commission other than
computers themselves- includes software
These crimes often affect the elderly through phone
scams promising large cash prizes after giving up
personal information such as bank account numbers, or
social security numbers.
(Siegel, 2010)
(Foster, 2000)
7. Cell Phone Fraud- fraudulently or
legitimately obtained cell phones used for
deceptive purposes such as promises of fake
charities or prizes designed to illicit personal
information and money from people
Software Piracy- illegal downloads of
software from the internet
(Siegel, 2010)
(Foster, 2000)
9. Duplicating Software
Selling duplicated software via internet or
otherwise
This crime generally means using technology
other than computers in commission of crime
(Siegel, 2010)
(Foster, 2000)
10. Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
These crimes promote child pornography, and
perpetrators swindle millions of dollars a year from
innocent people while remaining anonymous.
(Siegel, 2010)
(Foster, 2000)
11. Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs
for profit
Denial of Services Attack- used to annoy or
extract money from web users by preventing
access to service
(Siegel, 2010)
(Foster, 2000)
12. Illegal Copyright Infringement (Warez) â
stealing software, destroying itâs copyright
information, then posting on internet or file
sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or
bank account information
(Siegel, 2010)
(Foster, 2000)
13. Phishing- duplicating legitimate websites in
order to obtain personal information
E-tailing- illegal buying selling products via
internet using fraudulent receipts (shoplisting)
and switching codes on merchandise for refunds
(Siegel, 2010)
(Foster, 2000)
14. Cyber crime in which perpetrators have political
motives attached
These crimes may involve computer network
penetrations on military bases, defense contractors, and
aerospace companies. The goal is to embezzle vital data
and information
(Siegel, 2010)
(Foster, 2000)
15. Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use the
internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons lab.
Can also be used to attack electric power and
essential services
(Siegel, 2010)
(Foster, 2000)
16. The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes so
rapidly it is hard to keep up with the training
(Siegel, 2010)
(Foster, 2000)
17. Some of these challenges include:
Global nature of cybercrime
High tech crimes are often misclassified causing
Statistical information to be skewed
Allocation of funds usually favors traditional
crimes because of skewed statistics
Plenty of these crimes go unreported or recorded
wrongly as traditional crimes, for the UCR
(Siegel, 2010)
(Foster, 2000)