Type of Crime That Use It Systems as Weapons
Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures. Out of the many crimes that use IT systems, the one that cost us the most would have to be identity theft. Biegelman states, “Simply put, identity theft is the stealing of your good name and reputation for financial gain. Yet not everyone can agree on a suitable meaning of the term. The definition of this crime differs among law enforcement, regulatory agencies, and the many studies of this subject” (2). There is big money at stake and the financial rewards for criminals are almost limitless, they go to amazing lengths to defraud their victims. The Federal Trade Commission (FTC) estimates that as many as 9 million people have their identities stolen each year (FTC, 2012). Experts agree that identity theft is a serious problem, and special precautions must be taken to avoid it. When people become the victims of identity theft, they are unaware of what just happened, and they need answers. According to the FTC,
Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars
Cited: FTC. About Identity Theft. Retrieved April 28, 2012, from http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity- theft.html
Privacy Rights (2002, March 15). Don 't Assume the Change of Address Form Works. Retrieved April 28, 2012, from http://www.privacyrights.org/cases/victim23.htm
USDOJ. Identity Theft and Fraud. Retrieved April 29, 2012, from http://www.usdoj.gov/criminal/fraud/websites/idtheft.html
Ross, Jeffrey Ian. Criminal Investigations: Cybercrime. New York: InfoBase, 2010.
Print.
Liegeman, Martin T. Identity Theft Handbook. New Jersey: John Wiley & Sons, 2009.
Print.
Goodridge, Elisabeth. "Steps to Prevent Identity Theft, and What to Do if It Happens." New York Times. 1 May 2009. Web. 29 April 2012.