computer crime ispit.docx

3
COMPUTER CRIME • Spam (anti-spam laws) fraud, identity theft, and theft of classified information. Spam Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time Fraud Main article: Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. [citation needed] In this context, the fraud will result in obtaining a benefit by: Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect; Altering or deleting stored data; Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes. Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. A variety of Internet scams target direct to consumers IDENTITY THEFT Cyber identity theft is the use of computers and communication systems to steal an electronic copy of information. Stealing this information often goes undetected and rarely, if ever, is the criminal discovered or apprehended Theft of classified information Classified information is a term applied to material that a government or group of governments claims is sensitive information that requires secrecy based on national or regional security needs • Cyber terrorism

Upload: jelena-stojanovic

Post on 08-Nov-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

COMPUTER CRIME Spam (anti-spam laws) fraud, identity theft, and theft of classified information.

SpamSpam, or the unsolicited sending of bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some timeFraudMain article: Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.[citation needed] In this context, the fraud will result in obtaining a benefit by: Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect; Altering or deleting stored data; Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information.A variety of Internet scams target direct to consumersIDENTITY THEFT Cyber identity theft is the use of computers and communication systems to steal an electronic copy of information. Stealing this information often goes undetected and rarely, if ever, is the criminal discovered or apprehended

Theft of classified informationClassified information is a term applied to material that a government or group of governments claims is sensitive information that requires secrecy based on national or regional security needs Cyber terrorismCyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.Cyberextortion is a form of cyberterrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks Hate crimesA hate crime is usually defined by state law as one that involves threats, harassment, or physical harm and is motivated by prejudice against someone's race, color, religion, national origin, ethnicity, sexual orientation or physical or mental disability.Cyber-bullying

Legal definition / Cyber-bullying vs. cyber-stalking /Methods used

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone. Cyberbullying is often done by children, who have increasingly early access to these technologies. The problem is compounded by the fact that a bully can hide behind an electronic veil, disguising his or her true identity. This secrecy makes it difficult to trace the source and encourages bullies to behave more aggressively than they might face-to-face.Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. A cyberstalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages.

Electronic harassment is a term referring to the use of electronic devices to harass, torture, or harm a person using some form of direct or indirect physical influence on their mind or body. It should not be confused with cyberstalking, where the harm involves only communication

Law enforcement: cyber-bullying, cyber-stalking and electronic harassmentProtection for victims of any ageThere are laws that only address online harassment of children or focus on child predators as well as laws that protect adult cyberstalking victims, or victims of any age. Currently, there are 45 cyberstalking (and related) laws on the books.While some sites specialize in laws that protect victims age 18 and under, Working to Halt Online Abuse is a help resource containing a list of current and pending cyberstalking-related United States federal and state laws.[13] It also lists those states that do not have laws yet and related laws from other countries. The Global Cyber Law Database (GCLD) aims to become the most comprehensive and authoritative source of cyber laws for all countries Harmful effects: United States v. Lori DrewUnited States v. Drew[1] is the final decision in a criminal case that charged Lori Drew of violations of the Computer Fraud and Abuse Act (CFAA) over the alleged "cyberbullying" of a 13-year old, Megan Meier, who committed suicide.[2][1] The federal district court vacated the jury's verdict convicting Drew of a misdemeanor violation of the CFAA.

Legislation against cyber-bullying (the United States/Preventative legislation)