Computers and Internet: From a Criminological View

Published on June 2016 | Categories: Documents | Downloads: 30 | Comments: 0 | Views: 268
of 4
Download PDF   Embed   Report

Nowadays, development of computers and internet based technologies open a new section of crimes against people everyday life. Computers and internet crime is the most concerning issue in all the security plans. In this paper, we will talk about the computers and internet crimes briefly and introduce different topologies of cyber crimes. Also, some brief notes about the position of Interpol regarding cyber crimes is embedded to the paper.

Comments

Content

International Journal of Economy, Management and Social Sciences, 2(4) April 2013, Pages: 104-107

TI Journals

International Journal of Economy, Management and Social Sciences

ISSN
2306-7276

www.waprogramming.com

Computers and Internet: From a Criminological View
Masoud Nosrati *1, Mehdi Hariri 2, Alireza Shakarbeygi 3
1,2,3

The scientific member of Law group in Payam Noor University, Iran.

AR TIC LE INF O

AB STR AC T

Keywords:

Nowadays, development of computers and internet based technologies open a new section of
crimes against people everyday life. Computers and internet crime is the most concerning issue in
all the security plans.

computer crime
internet crime
cyber crime

In this paper, we will talk about the computers and internet crimes briefly and introduce different
topologies of cyber crimes.
Also, some brief notes about the position of Interpol regarding cyber crimes is embedded to the
paper.
© 2013 Int. j. econ. manag. soc. sci. All rights reserved for TI Journals.

1.

Introduction

Whether you use computers and internet to do your weekly food shop or keep in touch with friends, the internet is fast becoming a key part
of our everyday lives.
Computer users of all ages are surfing the web, interacting with new acquaintances and sharing information but as the popularity of the
internet continues to rise criminals are turning technology into a tool for crime.
Computer crime refers to any crime that involves a computer and a network [1]. Also, internet crime is a loose term used to describe a
range of crimes committed online like computerized fraud, hacking and child pornography [2]. The computer may have been used in the
commission of a crime, or it may be the target [3]. Net crime refers to criminal exploitation of the Internet [4].
Cyber crimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)" [5]. Such
crimes may threaten a nation’s security and financial health [6]. Issues surrounding this type of crime have become high-profile,
particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of
privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cyber crime, including espionage, financial theft, and other cross-border
crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber
warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court
[7].

2.

Types of computer crime

Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target
computers directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the cats network
or device.
Crimes that primarily target computer networks or devices include:
o
o
o

Computer viruses
Denial-of-service attacks
Malware (malicious code)

Crimes that use computer networks or devices to advance other ends include:
o

Cyberstalking

* Corresponding author.
Email address: [email protected]

Computers and Internet: From a Criminological View

105

Internat ional Jour nal of Economy, Mana ge ment and Social Sciences , 2(4) Apri l 2013

o
o
o

Fraud and identity theft
Information warfare
Phishing scams

Spam
Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages
sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting
malware. Spam email may also include malware as scripts or other executable file attachments. Definitions of spam usually include the
aspects that email is unsolicited and sent in bulk [8][9][10][11][12]. One subset of UBE is UCE (unsolicited commercial email).
Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are
relatively new, limits on unsolicited electronic communications have existed for some time [13].

Computer fraud
Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.
In this context, the fraud will result in obtaining a benefit by:
Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees
altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;
Altering or deleting stored data;
Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified
information.
A variety of Internet scams target direct to consumers.

Obscene or offensive content
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some
instances these communications may be illegal.
Over 25 jurisdictions place limits on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or
inflammatory material that tends to incite hate crimes.
The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in
which the courts can become involved in arbitrating between groups with strong beliefs.
One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

Harassment
Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals
focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested parties (see cyber bullying, cyber stalking, hate crime, Online predator, and stalking). Any comment that
may be found derogatory or offensive is considered harassment.
There are instances where committing a crime, which involves the use of a computer, can lead to an enhanced sentence. For example, in the
case of United States v. Neil Scott Kramer, Kramer was served an enhanced sentence according to the U.S. Sentencing Guidelines Manual
§2G1.3(b)(3) [14] for his use of a cell phone to “persuade, induce, entice, coerce, or facilitate the travel of, the minor to engage in
prohibited sexual conduct.”
Connecticut was the first state to pass a statute making it a criminal offense to harass someone by computer. Michigan, Arizona, and
Virginia have also passed laws banning harassment by electronic means [15].
Harassment by computer statutes are typically distinct from cyber bullying laws, in that the former usually relates to a person's "use a
computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or
proposal of an obscene nature, or threaten any illegal or immoral act," while the latter need not involve anything of a sexual nature.

106

Masoud Nosrati et al.
Internat ional Journal of Economy, Mana ge ment and Social Science s , 2(4) Apri l 2013

Threats
Although freedom of speech is protected by law in most democratic societies (in US this is done by First Amendment) that does not include
all types of speech. In fact spoken or written "true threat" speech/text is criminalized because of "intent to harm or intimidate", that also
applies for online or any type of network related threats in written text or speech [16]. The US Supreme Court definition of "true threat" is
"statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular
individual or group" [16].

Drug trafficking
Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet
Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes
for amphetamines in restricted-access chat rooms.
The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more
intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are
severely minimized and the filtering process that comes with physical interaction fades away.

Cyber terrorism
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist
organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow
definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for
personal objectives [17]. Objectives may be political or ideological since this is a form of terrorism.
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has
prompted official responses from government agencies.
Government officials and Information Technology security specialists have documented a significant increase in Internet problems and
server scans since early 2001. But there is a growing concern among federal officials that such intrusions are part of an organized effort by
cyberterrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist is someone
who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based
attack against computers, network, and the information stored on them [18].

Cyber warfare
Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen
as analogous to conventional warfare [19] although this analogy is controversial for both its accuracy and its political motivation.
U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nationstate to penetrate another nation's computers or networks for the purposes of causing damage or disruption."[20]:6 The Economist describes
cyberspace as "the fifth domain of warfare,"[21] and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter,
the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations
as land, sea, air, and space." [22]

3.

Interpol and cyber crime

Based on the website of Interpol in cyber crime section [23] “Cyber crime is one of the fastest growing areas of crime”. These crime cases
include attacks against computer data and systems, identity theft, the distribution of child sexual abuse images, internet auction fraud, the
penetration of online financial services, as well as the deployment of viruses, Botnets, and various email scams such as phishing.
The global nature of the Internet has allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for
all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The use of the Internet by terrorists,
particularly for recruitment and the incitement of radicalization, poses a serious threat to national and international security.
In addition, the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such
as power plants, electrical grids, information systems and the computer systems of government and major companies.

Computers and Internet: From a Criminological View

107

Internat ional Jour nal of Economy, Mana ge ment and Social Sciences , 2(4) Apri l 2013

The changing nature of cybercrime
In the past, cybercrime has been committed by individuals or small groups of individuals. However, we are now seeing an emerging trend
with traditional organized crime syndicates and criminally minded technology professionals working together and pooling their resources
and expertise.
This approach has been very effective for the criminals involved. In 2007 and 2008 the cost of cybercrime worldwide was estimated at
approximately USD 8 billion. As for corporate cyber espionage, cyber criminals have stolen intellectual property from businesses
worldwide worth up to USD 1 trillion.

INTERPOL's role
INTERPOL’s cybercrime programme is built around training and operations and works to keep up with emerging threats. It aims to:
o
o
o
o
o
o
o
o

Promote the exchange of information among member countries through regional working parties and conferences;
Deliver training courses to build and maintain professional standards;
Coordinate and assist international operations;
Establish a global list of contact officers available around the clock for cybercrime investigations (the list contained 134 contacts
at the end of 2012);
Assist member countries in the event of cyber-attacks or cybercrime investigations through investigative and database services;
Develop strategic partnerships with other international organizations and private sector bodies;
Identify emerging threats and share this intelligence with member countries;
Provide a secure web portal for accessing operational information and documents.

References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]

[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]

Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.
Internet crime article, from Essex University website: http://www.essex.police.uk/be_safe/internet_crime.aspx
Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 0-201-70719-5.
David Mann And Mike Sutton (2011-11-06). ">>Netcrime". Bjc.oxfordjournals.org. http://bjc.oxfordjournals.org/cgi/content/abstract/38/2/201.
Retrieved 2011-11-10.
Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global.
ISBN 978-1-60960-830-9
Internet Security Systems. March-2005.
"Cyber Warfare And The Crime Of Aggression: The Need For Individual Accountability On Tomorrow’S Battlefield". Law.duke.edu.
http://www.law.duke.edu/journals/dltr/articles/2010dltr003.html. Retrieved 2011-11-10.
Farmer, James John (2003-12-27). "3.4 Specific Types of Spam" (FAQ). An FAQ for news.admin.net-abuse.email; Part 3: Understanding NANAE.
Spam
FAQ.
Archived
from
the
original
on
2004-02-12.
http://web.archive.org/web/20040212175535/http://www.spamfaq.net/terminology.shtml#specific_spams. Retrieved 2008-08-19.
"You Might Be An Anti-Spam Kook If...". Rhyolite Software. 2006-11-25. http://www.rhyolite.com/anti-spam/you-might-be.html#spam-fighter-4.
Retrieved 2007-01-05.
"On what type of email should I (not) use SpamCop?" (FAQ). SpamCop FAQ. IronPort Systems. http://www.spamcop.net/fom-serve/cache/14.html.
Retrieved 2007-01-05.
Scott Hazen Mueller. "What is spam?". Information about spam. Abuse.net. http://spam.abuse.net/overview/whatisspam.shtml. Retrieved 2007-01-05.
"Spam Defined". Infinite Monkeys & Co. 2002-12-22. http://www.monkeys.com/spam-defined. Retrieved 2007-01-05.
Telephone Consumer Protection Act of 1991, Do-Not-Call Implementation Act of 2003, CAN-SPAM Act of 2003.
"2011 U.S. Sentencing Guidelines Manual § 2G1.3(b)(3)". http://www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm.
"Section 18.2-152.7:1". Code of Virginia. Legislative Information System of Virginia. http://leg1.state.va.us/cgi-bin/legp504.exe?000+cod+18.2152.7C1. Retrieved 2008-11-27.
Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010, pp. 91
http://www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf
Matusitz, Jonathan (April 2005). "Cyberterrorism:". American Foreign Policy Interests 2: 137–147.
DOD – Cyberspace. Dtic.mil. Retrieved 8 November 2011.
Clarke, Richard A. Cyber War, HarperCollins (2010)
"Cyberwar: War in the Fifth Domain" Economist, 1 July 2010
Lynn, William J. III. "Defending a New Domain: The Pentagon's Cyberstrategy", Foreign Affairs, Sept/Oct. 2010, pp. 97–108
Cyber crime article, from Interpol website at: http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close