I. Introduction:
Computer crime, or cyber crime, as it is more commonly called, refers to criminal activity that is carried out with the use of a computer and often the Internet. According to Symantec.com, there were over 1,600,000 reported or recorded cyber crime threats in the year 2008 alone, over a million more than the 2007 statistic. Educating yourself on the dangers of computer crime and how to avoid it just may save you from much grief and suffering.
Cyber crime is an international issue, depriving online users of billions of dollars a year. Whether using traditional techniques, employing malicious software, using the Internet as a platform for illicit sexual activity or attempting to subvert governments, cyber criminals seek to conduct their crimes in total anonymity.
Computer crime refers to any crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation
Bibliography: - Glocal Technology Research, Inc. * Acceptable Use Of Information Systems At Virginia Tech * STATEMENT OF SENATOR PATRICK LEAHY: Hearing Before The Senate Judiciary, Subcommittee On Technology, Terrorism, and Government Information. "Internet Crimes Affecting Consumers" March 19, 1997. * Hacker Accused of Credit-card Fraud - FBI Says He Collected 100,000 Credit-card Numbers, Associated Press, May 23, 1997. * "Computer Crimes and Computer Related or Facilitated Crimes", Statement of Charles L. Owens , Chief, Financial Crimes Section, Federal Bureau of Investigation, March 19, 1997.FBI 's role in attacking Internet crimes affecting consumers. * A listing of resources from O 'Reilly & Associates may be useful. * Computer Crime: A Crimefighter 's Handbook * Criminal Law and The Internet © by Mark D. Rasch * CPRS maintains a collection of materials related to Computer Crime including records of court cases. * "The Feds and the Net: Closing the Culture Gap" By Mike Godwin -- a talk given at the FBI and commentary. * The Computer Crime Page from MIT 6.805/STS085: Readings on Computer Crime * The Jones Telecommunications and Multimedia Encyclopedia as an entry on "computer crime" in their update section. We hope that they will maintain this on-line; otherwise one will have to purchase their CD-ROM. * COMPUTER CRIME RESEARCH RESOURCES by Bruce T. Fraser, J.D. * CyberSpace Law Center: Cybercrime Resources * Chicago-based Emergency Response and Research Institute: Technical Operations Page; Management, Computers, and the Future * FBI SAYS CYBERCRIME IS BECOMING AN "EPIDEMIC" by Paul Anderson, ERRI Analyst * "Security of the Internet", Published in The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York, 1997, pp. 231-255. * An Analysis Of Security Incidents On The Internet 1989 - 1995, A dissertation submitted to the graduate school in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering and Public Policy by John D. Howard, Pittsburgh, Pennsylvania 15213 USA, April 7, 1997 * ECPE 6504 (Virginia Tech) : Network Security Reference Information | |