Preview

High Tech Offenders

Good Essays
Open Document
Open Document
863 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
High Tech Offenders
Cyber crimes

Thesis:
Cybercrime, hacking, blackmailing, fraud, piracy, cyber bullying, this are some types of crimes th at come to mind when we hear technology and crime. Every day we use technology as a part of our daily living. We are surrounded by technology we depend on technology. But this has also o pen new door for criminal to conduct their crimes. This also makes us vulnerable to those who have mater it.
Microsoft piracy case 25 men were arrested and 11 where proven guilty in the national copy right Microsoft counter eiting ring. The fraudulent Microsoft cds and DVDs where sold online and where shipped from c hina to anywhere in the united stated and to Europe. The imitation Microsoft software was valu ed at 500 million dollars. Differential association theory states that criminal actions are a result of the friendships of or companionship with others. Differential association theory explained th at a person could not commit a crime without first being trained. Without prior influence, is inc apable of inventing criminal behavior. a) techniques of committing the crime, which are someti mes very complicated, sometimes very simple; (b) the specific direction of motives, drives, ratio nalizations, and attitudes Individuals become criminal due to repeated contacts with criminal activity and a lack of contact with noncriminal activity. I believe that this counterfeiting ring was built on friendships. The 25 men must have been friends of acquaintances at some point I do not believe they would hire people who did not know about their illegal actions.

Social bond theory
Roman meydbray 27 from San Jose. A former information technology manager of creative explosions pleads guilty to getting unauthorized access to a computer of his former employer. According to the court after two weeks of his termination he got access to the computer system and deleted an email server domain and accesses the email account of the president of creative

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Fahrenheit 451 Themes

    • 299 Words
    • 2 Pages

    technology is interfering with peoples lives and how they are being distracted from what is…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Choice theories are based on a perspective on crime causation that holds that criminality is the result of…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bank Fraud

    • 2619 Words
    • 7 Pages

    On december 18, 2013, three men were charged with counterfeit, forgery, criminal conspiracy and identity theft. These men hailed in Phillidelphia and New York. These men have stolen business checks from a US Postal office between the years of 2010-2012. The suspects are as follows :Traore Boubacar,Amed Conde,Jeremy Gekonge, Saheed Adebayo, and Adebisis Oladipupo. Booubacar and Conde are…

    • 2619 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    How have criminals adapted to changes in technology? What do you consider the biggest threat to society from the criminals’ adaptation?…

    • 257 Words
    • 1 Page
    Good Essays
  • Good Essays

    1. Differential Association theory would explain the burglar’s behavior by first looking at their social structure. Their social structure can affect everything; it can influence their close relationships, open them up to objective opportunities and could be seen as the main attribute that affects their learning process in behavior.…

    • 890 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Through the decades, the use of technology has allowed for much growth in all aspects of life by allowing for an evolutionary understanding in that there is always more to be discovered. Technology allows for a deeper understanding and that there is an infinite amount of knowledge to be learnt through the use of technology. Technology is a valuable tool that was created to achieve a better understanding of the world and everything around us. Evolution can bring about advancements that better help society grow in more ways than one. The evolutionary progression of technology has allowed for numerous technological advancements within the Criminal Justice System, resulting in more efficient and reliable ways to receive and process data.…

    • 1585 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Computer Associates

    • 1339 Words
    • 6 Pages

    The Securities and Exchange Commission announced securities fraud charges against Computer Associates International, Inc. and three of the company 's former top executives -- Sanjay Kumar, former CEO and Chairman, Stephen Richards, former Head of Sales, and Steven Woghin, former General Counsel. The SEC alleges that from 1998 to 2000, Computer Associates routinely kept its books open to record revenue from contracts executed after the quarter ended in order to meet Wall Street quarterly earnings estimates. In total, Computer Associates prematurely recognized $2.2 billion in revenue in FY2000 and FY2001 and more than $1.1 billion in premature revenue in prior quarters. In addition, Computer Associates, through former executives Kumar, Richards and Woghin and others, obstructed the SEC 's investigation into the company 's accounting practices.…

    • 1339 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    TECHNOLOGY AND CRIME

    • 946 Words
    • 4 Pages

    The first thing that needs to be said is that Cell phones, email and instant messaging have facilitated the criminals into “doing their job” by lessening their communication gap to only seconds. It is important to add that criminal masterminds from different countries no longer have to sit in the same conference room and plot, with the fear of any law enforcement agency locating their secret meeting place. All they have to do is either talk to each other on their cell phones using conference calling and send and receive written and graphical information on the same device, or simply send an email. This is one of the major reasons why crimes such as car theft, robbery, stalking and terrorism have mounted. Crimes like drug dealing don’t depend on letters, or dealers to visit the purchaser personally anymore. A simple phone call will suffice as a source of contact between the two parties. A phone call and the price will be…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Governments in different countries fight computer software piracy; in which it provides support to national programs in order to educate and provide awareness to business communities.…

    • 1766 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Online Banking

    • 2749 Words
    • 11 Pages

    U.S. Code Collection. Title 18 Part I Chapter 47 Sec 1030. Fraud and Related Activity in Connection with Computers. September 23 2005.…

    • 2749 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime.…

    • 5098 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    For the past few years, Malaysia has been slowly in the Information Technology area. Malaysians are more IT literate and the awareness towards technology usage has increased. The high demand towards technology encouraged the country to open up more technological industries. For instant, due to the demands and needs of the users, a small Scottish software company designed software where it allowed users to safely share and communicate in a secure and safe environment. Without any marketing, the company manages to show a sign of growth through word of mouth. Meanwhile, this led to the escalating software piracy record. Thus, software piracy is about to overshadow the Malaysia’s reputation. The Malaysia government is trying their level best to fight against this crime for years.…

    • 5625 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Computer Crimes

    • 1328 Words
    • 6 Pages

    A computer crime would be defined as criminal activity where a computer or network is the source or place of a crime. Computer crimes have become more common in today’s society. In the old days people would rob banks to get a pay out, nowadays people are committing crimes through computers. Besides the obvious difference, computer crimes have a much larger pay out than the old fashioned bank robbery. Someone who may rob a bank could walk away (that’s if they get away) with a couple hundred thousand, someone who commits a crime through the network will walk away (they usually get away) with millions. Personally I believe the reason for increasing computer crimes is because so many are unaware of them.…

    • 1328 Words
    • 6 Pages
    Good Essays