Computer Crime Can Be Classified Term Paper

Total Length: 1216 words ( 4 double-spaced pages)

Total Sources: 4

Page 1 of 4

Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of phishing and identity fraud are more easily carried out in countries with less lax laws regarding computer crime, fraud, embezzlement, and identity theft than in the United States (Lovet, 2007). However, one of the largest cases of consumer identity theft was carried out in the United States this year, when "at least 45.7 million credit and debit cards was stolen by hackers," (Swetenham, 2007).

Especially since September 11, law enforcement officials in the United States have been increasingly concerned about the possibility of cyberterrorism: the use of computer systems to harm or kill people. No act of cyberterror has been documented. However, all major public systems currently rely on computerized control systems and databases that, if tampered with, could cause serious damage. For example, hydroelectric dams are controlled and monitored by computers. Public transportation systems also depend on computer controls and monitoring. A terrorist who hacked into one of these systems could cut off a city's power, or trap millions of passengers in public transportation vehicles.

In 2004, the Council of Europe enacted a trans-national treaty regarding the prevention and prosecution of computer crime.
The United States agreed to get on board with the convention in January 2007. The treaty largely targets organized crime and was designed to "protect citizens against computer hacking and Internet fraud, as well as crimes involving electronic evidence, including child sexual exploitation, organized crime and terrorism," (McCormack, 2006). The treaty does not address the problems of hacking and cracking directly, unless those activities are designed to perpetrate fraud or organized criminal activities and especially when those crimes crossed national boundaries.

Computer crime can also include what is known as "cracking." Like hacking, cracking can be maverick attempts at practical jokes like replacing a Microsoft corporate logo with picture of a donkey or inserting pornographic images onto a government web site. Laws against cracking vary state-by-state. Some forms of computer crime are outright strange, like the "happy slapping" incidents in Europe in which a ring of low-grade cybercriminals arranged public assaults of strangers. The "cruel and sometimes lethal form of entertainment" involved filming the attacks on cellular phone cameras, the images then posted online (Swetenham, 2007).

The United States Department of Justice lists a litany of cases prosecuting cybercriminals, showing that computer crimes are widespread and increasing in prevalence. As increasing numbers of people become computer literate, the digital universe becomes saturated with malicious users who seek to commit any number of offenses ranging from child pornography web rings to identity theft to hacking to acts of terror. Combating computer crimes will require aggressive.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Crime Can Be Classified" (2007, April 18) Retrieved June 27, 2025, from
https://www.aceyourpaper.com/essays/computer-crime-classified-38461

Latest MLA Format (8th edition)

Copy Reference
"Computer Crime Can Be Classified" 18 April 2007. Web.27 June. 2025. <
https://www.aceyourpaper.com/essays/computer-crime-classified-38461>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Crime Can Be Classified", 18 April 2007, Accessed.27 June. 2025,
https://www.aceyourpaper.com/essays/computer-crime-classified-38461