Term Paper on "Cyber Crime Enforcement"

Term Paper 7 pages (2633 words) Sources: 1+

[EXCERPT] . . . .

Cybercrime

As little as ten years ago, few people could have conceived of the Internet and its capabilities, let alone know how to illegally take advantage of this new communication vehicle. Yet today millions of people use the Web, and online crime is increasing at breakneck speed. Although much discussion has occurred about cybercrime worldwide, much more is needed to take a proactive stance. People at all levels -- consumers, company owners, state officials, judicial systems, and government representatives must be better trained on ways to implement and employ anti-cybercrime methods. In addition, both nationally and internationally, there has to be more consistent plans to deal with cyber-terrorist acts.

According to an article on ZDNet, startling figures from the National Hi-tech Crime Unit (NHTCU) in the United Kingdom were reported at an E-Crime Congress in London at the beginning of this April. Last year, electronic crime cost companies in the UK alone an estimated £2.45bn. Out of 200 companies surveyed, 178 experienced some form of high-tech crime. Of these latter firms, 90% reported their systems were intruded and 89% said data was stolen. Virus attacks hit 97% of survey respondents, which cost them a total of more than £70m. Nine percent had suffered financial fraud, at a cost of £68m.

The situation in the United States does not fare any better. According to the National White Collar Crime Center (2004) study, the Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), reported that From January 1, 2004 to December 31, 2004, the
Continue scrolling to

download full paper
IC3 website received 207,449 complaint submissions. This was a 66.6% increase over 2003 when 124,509 complaints were received. These filings consisted of fraudulent and non-fraudulent complaints primarily related to the Internet. From these submissions, IC3 referred 103,959 complaints of fraud, the majority of which were committed over the Internet or a similar online service. This was a 64.2% rise over 2003 with 63,316 complaints referred. The total dollar loss from all referred cases of fraud was $68.14 million. In addition, the report noted that Internet auction fraud was by far the most reported offense, with 71.2% of referred complaints. Most experts believe that common forms of computer- related crime are significantly underreported because victims may not realize that they have been involved in a crime, or may decide not to complain for reasons of embarrassment or corporate credibility.

The term "cybercrime" or "cyber fraud" is defined in various ways. When analyzing statistics and reports on this topic, therefore, it is important to keep in mind that variables exist. For example, Tavani in "Defining the Boundaries of Computer Crime," (2001), "cybercrime" defined "cybercrime" as "a special category of criminal acts that can only be executed through the utilization of computer and network technologies. In his view, cybercrime consists of three basic categories: software piracy, electronic break-ins and computer sabotage.

Software piracy involves the unauthorized duplication of proprietary software and the distribution or making available of these copies over the electronic network. The unauthorized copying and distribution of MP3 files, for instance, would fall under this category. Electronic break-ins consist of gaining unauthorized access to a computer system or to a private, password-protected Internet site. The third category, computer sabotage, involves the use of viruses, worms and DoS attacks that interfere with electronics and disturb flow of information (Tavani). When cybercrime is done on a large scale, it is instead called "cyberterror."

It did not take people long after the development of the Internet to determine ways to legally and illegally gain from this new communication system. However, cybercrime did not occur "overnight," according to a 2002 report by Syngress. In the earlier days of computing and networking, criminals did not have the technical ability or hardware to break into the mainframe systems. Cybercrime instead developed along with the technological advances that made computing so easy and accessible that even kindergarten children could use the Internet for fun and information.

In the 1960s, the term "hacker" had a far less negative connotation than it does today. It had more to do with the ability of allowing a system to handle more than it was previously capable of, rather than illegal actions. Not surprising, the first hacker group developed out of the "computer university," Massachusetts Institute of Technology, in 1961. By the 1970s, however, "hacking" was being used by the "yippies" and other more radical underground groups as part of their antiestablishment efforts. In the 1980s, the FBI started arresting some of the more prominent hackers such as Kevin Mitnik (Syngress). In movies such as the Hackers in the 1990s, these individuals still remained in a semi- romantic light.

In the background, however, other things were happening that did not bode well for the hackers' positive reputation. In the morning of November 3, 1988, also known as "Black Thursday," system administrators nationwide found that their computer networks were moving very slowly, if at all. If they could log in and generate a system status listing, they saw scores of "shell," or command interpreter, processes. If they tried to kill these processes, new ones appeared even faster. Rebooting the computer had no positive effect.

These systems had been invaded by a "worm," or a program that duplicates itself across a network and uses resources on one machine to attack another. A worm is not quite the same as a "virus," which is a program fragment that inserts itself into other programs. The worm had taken advantage of lapses in security on systems that allowed it to connect to machines across a network, bypass their login authentication, copy itself, and then proceed to attack still more machines. The massive system load was generated by multitudes of worms trying to propagate the epidemic (Seeley). After this event, the hacker was no longer a "nice guy "in most people's eyes, especially those who had lost information or whose systems had been shut down by the worm.

By 1990, increasing numbers of e-mail users recognized that their communications could be intercepted. Phillip Zimmerman developed an encryption program called Pretty Good Privacy (PGP) that could be used to protect private messages. However, PGP was also being used by individuals to hide their crimes (Syngress). The first cyberBank called First Virtual went online in 1994, and hackers had all new horizons to conquer. In addition Internet Protocol security started becoming an issue of concern. In 1995, the U.S. Secret Service and Drug Enforcement Agency (USDEA) obtained an Internet wiretap to help develop a case against individuals who were accused of producing and selling illegal cell phone equipment. A year later, another electronic concern came into the forefront for both private and governmental groups -- Internet pornography. Congress passed the Communication Decency Act, which was later deemed unconstitutional.

Also in 1995, a hacker shut down the Public Access Networks Corporation in New York (Goldstein, 1989, pd). A "cancelbot" that wormed its way through Usenet decimated 25,000 messages. In addition, the Central Intelligence Agency, Federal Bureau of Investigation and U.S. Air Force computer systems were hacked.

Such events proved to be just the beginning (Denning, 2000). Over the next couple of years, numerous agencies and private organizations were invaded by hackers. In addition, there have been a few "cyberterroist" activities. In 1998, Spanish protestors bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was undeliverable to ISP's users, and support lines were tied up with people who could not receive their mail. The protestors also spammed IGC staff and member accounts and clogged their Web page with fraudulent credit card orders. In the same year, a 12-year-old boy successfully hacked into the controls for the Roosevelt Dam in Arizona. He could have released floodwaters and endangered at least one million people.

Although no one is prepared for massive cyberterroist actions, there has been some headway made in combining efforts on the national and international levels. Chawki, researcher at the School of Law, University of Lyon III, France, recently wrote a paper on the cybercrime regulation -- looking at how the issue is being addressed at national and international levels and reviewing the state of the existing legislative and regulatory framework and its efficiency in combating this form of cross-border organized crime. He uses the he European Union as a positive example of how countries can work together.

In 2003, the European Union European telecommunications and communications ministers gave final approval to the creation of a European Network and Information Security Agency. The main role of ENISA is to support the internal European Union market by facilitating and promoting increased cooperation and information exchange on issues of network and information security. Actions are also being taken by the Council of Europe, which consists of 44 member states, including all of the members of the European Union. The Council was established in 1949 primarily as a forum to uphold and strengthen human rights as well as promote democracy and the rule of law in… READ MORE

Quoted Instructions for "Cyber Crime Enforcement" Assignment:

Research paper on Cyber Crime Enforcement. Include an overview of Cyber Crime Enforcement and form an opinion with emphasis on the current legal issues and adequacy of current laws. Paper should include a central theme, thesis or argument made throughout the paper supported by empiracal facts, circumstances, issues, and/or opinions.

How to Reference "Cyber Crime Enforcement" Term Paper in a Bibliography

Cyber Crime Enforcement.” A1-TermPaper.com, 2005, https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067. Accessed 5 Jul 2024.

Cyber Crime Enforcement (2005). Retrieved from https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067
A1-TermPaper.com. (2005). Cyber Crime Enforcement. [online] Available at: https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067 [Accessed 5 Jul, 2024].
”Cyber Crime Enforcement” 2005. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067.
”Cyber Crime Enforcement” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067.
[1] ”Cyber Crime Enforcement”, A1-TermPaper.com, 2005. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067. [Accessed: 5-Jul-2024].
1. Cyber Crime Enforcement [Internet]. A1-TermPaper.com. 2005 [cited 5 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067
1. Cyber Crime Enforcement. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cybercrime-little-ten/28067. Published 2005. Accessed July 5, 2024.

Related Term Papers:

Cybercrime Includes a Range Essay

Paper Icon

According to the international policing organization INTERPOL (2013), cybercrime bleeds into the realm of terrorism easily. Terrorists can infiltrate government, financial, and infrastructural networks as a form of attack. Cybercrime… read more

Essay 4 pages (1215 words) Sources: 5 Style: APA Topic: Crime / Police / Criminal Justice


Cyber Crime Is a Serious Issue Term Paper

Paper Icon

Cyber Crime is a serious issue that has become more severe in recent years. There are many ways in which people and organizations can be victimized by cyber criminals. The… read more

Term Paper 8 pages (2431 words) Sources: 8 Style: MLA Topic: Crime / Police / Criminal Justice


Cybercrime What's in a Name? Term Paper

Paper Icon

Cybercrime

What's in a name? That which we call a rose

By any other name would smell as sweet"

William Shakespeare (1564-1616) (Bartlett, 2000).

Cybercrime by Any Other Name

Similar… read more

Term Paper 9 pages (2690 words) Sources: 6 Style: Harvard Topic: Computers / IT / Internet


Cybercrime Prevention Program Essay

Paper Icon

Cybercrime is a concept that never been comprehensively defined using a single and universal definition. It can be used to refer to a criminal offence that involves the use of… read more

Essay 10 pages (3003 words) Sources: 10 Topic: Crime / Police / Criminal Justice


Cyber Crime Purpose and Audience Organization Literature Review

Paper Icon

Cyber Crime

Purpose & Audience

Organization of the Paper

Forms of Online Abuse and Crime

Social and Economic Impact of Online Crimes

Likely Victims of Cyber and Internet Scam

Youth… read more

Literature Review 7 pages (3159 words) Sources: 5 Topic: Crime / Police / Criminal Justice


Fri, Jul 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!